Confidentiality 1
Confidentiality 1
net/publication/370048267
CITATIONS READS
20 62,502
2 authors, including:
Eungoo Kang
Eastern International University
34 PUBLICATIONS 266 CITATIONS
SEE PROFILE
All content following this page was uploaded by Eungoo Kang on 27 July 2023.
Survey Research
Received: February 28, 2023. Revised: March 31, 2023. Accepted: March 31, 2023.
Abstract
Purpose: Poor anonymity and confidential strategies by a researcher not only develop unprecedented and precedented harm to
participants but also impacts the overall critical appraisal of the research outcomes. Therefore, understanding and applying
anonymity and confidentiality in research is key for credible research. As such, this research expansively presents the importance
of anonymity and confidentiality for research surveys through critical literature reviews of past works. Research design, data and
methodology: This research has selected the literature content approach to obtain proper literature dataset which was proven by
high degree of validity and reliability using only books and peer-reviewed research articles. The current authors have conducted
screening procedure thoroughly to collect better fitted resources. Results: Research findings consistently mentioned the
confidentiality and anonymity principles are preserved and implemented as a means of protecting the privacy of all individuals,
establishing trust and rapport between researchers and study participants, as a way of critically upholding research ethical
standards, and preserving the integrity of research processes. Conclusions: Confidentiality and anonymity are research ethical
principles that help in providing informed consent to participants assuring subjects of the privacy of their personal data. As
provided by research bodies and organizations, every research process has to incorporate the principles to meet credibility.
Whelan (2007) further suggests that in the future, the team or the person who transcribes the data, keep the data's
research could take into account how participants feel confidentiality safe. For instance, data has to always be
about their anonymity and confidentiality, with the goal of kept separate from identifiable individuals and stored in
determining how purposeful and unintentional differences codes. Further, researchers should ensure that the records
affect the findings. Kokolakis (2017) elaborates on the and data are kept confidential by refraining from
phenomenon of privacy paradox that encompasses discussing the concerns that arose from an individual
participants' attitudes and behaviors toward the awareness, interview with other people in a manner that could lead to
understanding, and perception of privacy in research. As the identification of an individual. Technological
such, these aspects influence research outcomes in the way enhancements can improve confidentiality and anonymity
research implements its privacy strategies and approaches. in research. However, it should be considerable to think
Ideally, participants' attitudes and behaviors relating to about what the concept of confidentiality implies for social
privacy concerns are important in research outputs. research in the current century. This is especially true
Therefore, as suggested by Kokolakis (2017), in future considering the rapidly advancing technologies and
studies, rather than relying on self-reports of behavior, innovative approaches to social research and the
researchers should collect evidence of the actual behavior dissemination of its findings, such as the utilization of
of participants and implement the right confidentiality visual and online methodologies. Ideally, as put forward by
approaches for the most reliable data outputs. the prior studies (Wiles et al., 2008; Guillemin & Gillam,
Gibson and Brand (2013) point out that research 2004), with today's culture of increasing individualization,
studies on the topic of suicide are one of the critical in which people want their story to be shared and have the
examples of studies that require high-end anonymity and power to make this happen, the concept of secrecy may not
confidentiality approaches. Even though it is widely be one that is appropriate or desirable in certain types of
acknowledged that there is a need for additional qualitative social research, and this is something that needs to be
research on suicide, it is also abundantly obvious that the considered and heavily researched.
ethical considerations involved in carrying out such Anonymity and confidentiality provide some levels of
research need to be addressed. Research on suicide can be social and individual rights when undertaking surveys.
shaped and limited in various ways depending on the Lancaster (2017) highlights the need for confidentiality
constraints that are placed on confidentiality and when power relations between researchers and participants
anonymity throughout the ethics review process. As a play a critical function in the process and outcomes of
result, suggestions are required about ways in which research. There are complex domains of research in which
anonymity and confidentiality constraints and methods confidentiality and anonymity are highly important
relevant to suicide research can be enhanced (Gibson & requiring researchers to exercise high levels of research
Brand, 2013). As such, more credible information can be ethics. Lancaster (2017) examined the processes of
collected with anonymity and confidentiality playing Australian drug policy development through research
significant roles. Elaborately, as explained by the study surveys to elucidate the intertwining of power and research
(Hassan, Rehmani & Chen, 2019), privacy has been a key ethics. Ideally, administrations seek specific data that
element of most internet developments with the aim of participants are not always willing to divulge. Therefore,
protecting users' identities and confidential information. effective implementation of anonymity and confidentiality
Like research studies, privacy is key for the maximum can be a significant driving force in such situations.
engagement of participants and their willingness to Therefore, there is a need for elaborately developing
effectively partake in the processes. However, Hassan, confidentiality strategies when engaging the processes of
Rehmani and Chen (2019) suggest that there is an such surveys. Profoundly, Ali and Kelly (2004) note that
important need for effective future integration of privacy, social research can only achieve the highest levels of
confidentiality, and anonymity in the establishment of reliable information when participants, for instance,
surveys, whether in-person or online. consumers during market research, feel empowered in
Notably, there are occasions and exceptions where what they are going to say. Significantly, as informed
anonymity and confidentiality can be sidelined in research. consent forms one of the basics of ethical research
However, scientific research communities insist on processes, the importance of informed consent in research,
adherence to every ethical standard relating to anonymity insisting researchers have to be keenly implementing
and confidentiality. Sidelining the ethics in exceptional proper approaches for the same. However, the author
cases also requires following a set of ethics. Therefore, proposes that researchers need to consider whether their
researchers, guided by the importance of anonymity and ability to fulfill their mandate of affording respondents’
confidentiality in research, should always ensure that those dignity, respect, autonomy, and beneficence is hindered by
who have access to the research data, such as the research the unadulterated application of the concept of anonymity.
4 Eungoo KANG, Hee-Joong HWANG / Journal of Research and Publication Ethics 4-1 (2023) 1-7
If it is, then they need to evaluate why this is the case and more useful to researchers than participants at that time
develop sophisticated approaches. (Alase, 2017). Researchers should respect the privacy
rights of participants which in turn impacts positively on
the outputs of their research.
3. Results Hence, research should never come before a person's
basic right to privacy, which is almost never the case. So,
The primary reason for upholding confidentiality and those who plan, approve, and carry out research must
anonymity ethical guidelines during research is so that figure out how to do it in a way that protects the privacy of
study participants can be shielded from any potential harm. the people who take part. Profoundly, any violations of
Respondents whose identities are revealed alongside confidentiality are an infringement of a person's rights and
reports of their individual characterization cause potential put the research participant at risk of harm to their dignity,
harm to those respondents who possessed stigmatizing such as social embarrassment and shame, and even worse,
traits or behaviors (Surmiak, 2018). If the identities of economic predicaments. Such aspects occur when
vulnerable populations are exposed, such as children, the participants provide sensitive information about themselves
less privileged, or subordinates in the workplace, this could leading to social embarrassment when confidentiality is
result in adverse effects on these groups. Therefore, there is violated, and when participants provide data about their
an adamant need for researchers to uphold confidentiality workplaces or organization and privacy is not protected,
and anonymity principles during research processes. leading to problems with their managers.
The Belmont Report places a strong focus on
beneficence, which instructs researchers not to cause any 3.2. Establishing Trust and Rapport Between
harm to the people who participate in their studies, Researchers and Study Participants
therefore this priority should always align with researchers’
priorities, as explained by Bromley et al. (2015). The When participants in research studies are assured
Importantly, the confidentiality and anonymity principles of their anonymity and confidentiality, there is a significant
are preserved and implemented as a means of protecting establishment of trust and rapport between the researcher
the privacy of all individuals, establishing trust and rapport and the participants, as explained and elaborated by
between researchers and study participants, as a way of Bolderstone (2012), Joinson et al. (2010) and Karnieli et al.
critically upholding research ethical standards, and (2009). Positive relationships between researchers and
preserving the integrity of research processes. Further, the subjects are key to the successful outcomes of a research
principles also foster autonomy and provide participants process necessitating researchers to always strive to
with control and more freedom during research studies. establish trust and rapport at the early stages of research
processes. Importantly, as influenced by anonymity and
3.1. Protecting the Privacy of Participants in confidentiality principles, openness, and transparency of a
Research researcher to participants build trust and rapport which is
essential for effective data collection. It is important to note
Market Before engaging in any research study or that the transferability and credibility of research data are
survey, participants always need the affirmation of determined by the trustworthiness involved in the research
protection of their personal information that could process (Curtin & Fossey, 2007). Significantly, the
potentially cause harm to them. Ideally, researchers go out simplest way of establishing credible trustworthiness
quantifying sensitive research topics in which participants between the researcher and the subjects is by assuring them
who contribute to the data collection require privacy of their privacy rights through effective confidentiality and
protection. As such, it is upon the researcher to uphold anonymity strategies.
every necessary confidentiality and anonymity principle to Establishing and maintaining trust and rapport is one of
protect the privacy of the subject (Novak, 2014; Cohen et the most important foundations for effective
al., 2017). communication. Ideally, after a successful rapport has been
During research processes, no participants should have established, there will be an increase in trust, as well as
to worry about getting hurt because their private mutual respect, and communication will become more
information got out because they took part in the research. efficient (Guillemin & Gillam, 2004). This aspect is what
Participating in research is always voluntary, and everyone most researchers should always seek in the early processes
who takes part has to be assured of their safety influenced of studies. Both the researcher and the volunteer will have
by privacy (Brandimarte et al., 2013). Importantly, it is the a deeper grasp of and trust in their relationships with each
researcher's role and responsibility to keep research other. When two individuals have trust in one another and
subjects’ information private, since the research outputs are an understanding of one another, their communication will
Eungoo KANG, Hee-Joong HWANG / Journal of Research and Publication Ethics 4-1 (2023) 1-7 5
become more open and in-depth, which will result in the subjects become free and take control in the process. This
production of data that is rich in meaning and credibility. autonomy is significantly important in the data collection
Therefore, the outcome will most certainly be to the process as participants feel free to divulge any required
advantage of the research study. information (Giordano et al., 2007). As participants engage
in their own ways, ideas, and interests while following the
3.3. Upholding Research Ethical Standards research processes as laid out by the research, more in-
Giving the Research Process Integrity depth information is collected.
Notably, without elaborate confidentiality and
One of the most important functions of adhering to anonymity strategies by researchers, participants' level of
confidentiality and anonymity principles in research is to engagement in a study is lowered. Ideally, when one feels
maintain research integrity. Credible research is only their privacy is in jeopardy while being asked to provide
approved when the research had adhered to confidentiality sensitive information, they might be unwilling to
and anonymity principles and guidelines (Hammersley & participate or provide limited data. However, when
Traianou, 2012). Research credibility, through in-depth participants' autonomy is enhanced through choice, as
information provided by participants, is achieved when all explained by Halperin et al. (2018), more engagement in
ethical codes have been adhered to. More specifically, as the study is achieved. Therefore, the implementation of
confidentiality and anonymity are one of the most proper confidentiality and anonymity approaches provides
important ethical codes, strict adherence to the principles the importance of in-depth data collection by enhancing
ensures credible and authentic research, as further participants' autonomy, control in the study, and freedom of
explained by Alase (2017). When confidentiality and expression. It is also important to note that during the
anonymity codes are used in the process of research, its confidentiality and anonymity briefing process in the
transferability is enhanced. This aspect, being one factor of research, participants choose whether or not to participate
credible research, it is adamant that researchers engage through the informed consent ethical code. Therefore, as
these codes in their research processes so that the studies they accept to participate as influenced by good rapport
can attain the highest integrity levels. and trust, they develop more enthusiasm for participation
Confidentiality and anonymity foster trust and respect created by a good confidentiality briefing strategy.
between the researcher and participants which positively
impacts the data collection process in studies. Ideally, if
these research codes are not followed and the study still Protecting the Privacy of Participants
ends up gaining in-depth data, the study can be easily
termed as not credible, and its integrity not approved.
However, starting out a research process with informed
consent briefing, the research process is already on the Establishing Trust and Rapport
right path to being approved as one with integrity.
Significantly, most research studies are critically appraised
by critical reviewers and approved organizations who Upholding Research Ethical Standards
analyze the credibility and trustworthiness of research
studies. Therefore, for a study to pass the integrity test, it
must have incorporated and rationalize all confidentiality
and anonymity principles (Krol et al., 2016). Therefore, as Provide Autonomy, Control
the importance of confidentiality and anonymity principles
in research encompass the significance of providing
privacy security to participants and creating trust, they also Figure 1: Research Findings
enable research studies to attain credibility and integrity.
Confidentiality and anonymity strategies help in It is of the utmost importance that every researcher has
building good rapport and trust and assure participants of a solid understanding of the ethical rules pertaining to
their privacy and security in participating in research confidentiality and anonymity, and that these features be
studies. Consequently, as participants are assured of their effectively implemented in research operations. In an ideal
privacy and trust and respect have been established, the world, the necessity of integrating the principles not only
6 Eungoo KANG, Hee-Joong HWANG / Journal of Research and Publication Ethics 4-1 (2023) 1-7
extends from the requirement that the studies be credible and academic communities. It's possible that a researcher
and possess high levels of integrity but also has a positive will be barred from carrying out any further research or
impact on the data-gathering outputs of the research studies in the long run. Every ethical concern in research,
(Sutton & Austin, 2015). The researchers need to first earn including anonymity and anonymity, is accepted, approved,
the participants' informed consent before continuing with and enforced by relevant institutional agencies, and the
the research process. Once this step has been completed, relevance of these considerations is replicated in the
the study can only move forward in the proper direction if procedures of research.
there is a level of trust and rapport between the participants There is a possibility of selection bias in relation to the
and the researchers. As a result, the process of doing chosen body of literature that has been given in support of
research ought to be approached with the intention of the research review, which is one of the most significant
utilizing the strategies that have proven to be the most limitations of this review. Blinding bias is always present
successful in terms of maintaining confidentiality and when selective outcome reporting occurs in research
anonymity. processes, which makes it difficult to get an accurate view
Most significantly, maintaining participants' privacy of the research issue. Ideally, the criteria for selecting
and safety while doing research requires maintaining their specific pieces of literature that are relevant to the research
anonymity as well as confidentiality. Ideally, it is ethical to topic would require several ways that proceed step by step.
always keep the personal information of the participants In addition, because the significance of privacy and
safe and secure. This can only be disclosed or kept open anonymity has been extensively investigated in the study,
under certain circumstances, all of which must adhere to there is a pressing need for more elaboration on the
predetermined ethical criteria to be permitted. According to specific ways in which these concepts influence the
the suggestions of the prior research (Petrova et al., 2016), findings of the research using a variety of quantitative
the protection of personal information of each and every scales. It is necessary to conduct additional studies in order
subject should be of the utmost concern at all times. If the to have a better understanding of the significance of
participants' input into the study problem can be maintaining confidentiality and anonymity throughout the
demonstrated to meet certain credibility requirements, study process. As a result of this, particular aspects of
researchers are not concerned with the participant's importance will be discussed together with the weight that
personal particulars. When conducting studies, this they have in regard to the significance of the study.
component needs to be one of the primary goals that In addition, it is necessary for the research to define
researchers strive for. Importantly, research conducted in and classify certain ways and strategies for maintaining
the modern era has largely concentrated on delicate and confidentiality and anonymity in order to successfully
sensitive topics that influence communities on both a social elaborate on the significance of the principles underlying
and an economic level. For quantification and resolution of the research. Because different contexts, research methods,
these situations, in-depth information from specific and types require different approaches to maintaining
participants who have previous experience dealing with confidentiality and anonymity, it is necessary to discuss the
similar matters demanding high-level protection of particularities of maintaining confidentiality and
personal data is required. In this manner, their safety will anonymity in relation to the various settings and contexts
be ensured, as there will be no risk of any damage coming in which research is conducted.
to them, as confidentiality and anonymity are utilized in Confidentiality and anonymity are research ethical
the processes. principles that help in providing informed consent to
The protection of research participants' privacy and participants assuring subjects of the privacy of their
anonymity is of the utmost importance, as it is the only personal data. As provided by research bodies and
way to prevent participants from suffering adverse effects organizations, every research process has to incorporate the
on any front, be they social, economic, or psychological. principles to meet credibility and integrity standards. As
Hence, in the long run, sophisticated procedures will need such, studies that do not incorporate these aspects are
to be employed to collect reliable data. By conducting deemed not only not credible and unethical but also illegal.
critical reviews and appraisals of such research, the levels Significantly, researchers are required to utilize
of credibility and integrity will be high and will be confidentiality and anonymity protocols in their studies
effectively authorized. It is not only immoral but also which come with additional benefits to the studies in
unlawful to conduct research without using protocols to addition to being approved as ethical and credible. Ideally,
ensure the confidentiality and anonymity of participants confidentiality and anonymity positively impact in-depth
(Dennis et al., 2019; Vandekerckhove & Lewis, 2012). research data collection as they enhance the establishment
Researchers who do not follow the appropriate ethical of trust and rapport between participants and researchers.
norms risk facing disciplinary actions from both the legal When this aspect is developed, participants tend to engage
Eungoo KANG, Hee-Joong HWANG / Journal of Research and Publication Ethics 4-1 (2023) 1-7 7
more freely in studies generating more in-depth data. Halperin, I., Wulf, G., Vigotsky, A. D., Schoenfeld, B. J., & Behm,
Importantly, participants' privacy is key in ensuring their D. G. (2018). Autonomy: a missing ingredient of a successful
safety and well-being when they partake in a sensitive program?. Strength & Conditioning Journal, 40(4), 18-25.
survey. As such, to ensure their well-being, researchers Hammersley, M., & Traianou, A. (2012). Ethics in qualitative
research: Controversies and contexts. Sage.
have to adhere to every confidentiality and anonymity Hassan, M. U., Rehmani, M. H., & Chen, J. (2019). Privacy
procedure and approach. Despite the research limitations of preservation in blockchain based IoT systems: Integration
selection bias associated with most research reviews, this issues, prospects, challenges, and future research directions.
paper elaborately appraises the importance of Future Generation Computer Systems, 97, 512-529.
confidentiality and anonymity in research proposing the Joinson, A. N., Reips, U. D., Buchanan, T., & Schofield, C. B. P.
effective implementation of necessary approaches and (2010). Privacy, trust, and self-disclosure online. Human–
strategies by researchers in research processes. Computer Interaction, 25(1), 1-24.
Kaiser, K. (2009). Protecting respondent confidentiality in
qualitative research. Qualitative health research, 19(11),
1632-1641.
References Karnieli-Miller, O., Strier, R., & Pessach, L. (2009). Power
relations in qualitative research. Qualitative health research,
Alase, A. (2017). The interpretative phenomenological analysis 19(2), 279-289.
(IPA): A guide to a good qualitative research approach. Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: A
International Journal of Education and Literacy Studies, 5(2), review of current research on the privacy paradox
9-19. phenomenon. Computers & security, 64, 122-134.
Ali, S., & Kelly, M. (2004). Ethics and social research. Krol, K., Spring, J. M., Parkin, S., & Sasse, M. A. (2016, May).
Researching society and culture, 2, 116-127. Towards robust experimental design for user studies in
Avidan, M. S., Ioannidis, J. P., & Mashour, G. A. (2019). security and privacy. IEEE.
Independent discussion sections for improving inferential Lancaster, K. (2017). Confidentiality, anonymity and power
reproducibility in published research. British journal of relations in elite interviewing: conducting qualitative policy
anaesthesia, 122(4), 413-420. research in a politicised domain. International Journal of
Bolderston, A. (2012). Conducting a research interview. Journal Social Research Methodology, 20(1), 93-103.
of medical imaging and radiation sciences, 43(1), 66-76. Novak, A. (2014). Anonymity, confidentiality, privacy, and
Boruch, R. F., & Cecil, J. S. (2016). Assuring the confidentiality identity: The ties that bind and break in communication
of social research data. University of Pennsylvania Press. research. Review of communication, 14(1), 36-48.
Brandimarte, L., Acquisti, A., & Loewenstein, G. (2013). Petrova, E., Dewing, J., & Camilleri, M. (2016). Confidentiality
Misplaced confidences: Privacy and the control paradox. in participatory research: Challenges from one study. Nursing
Social psychological and personality science, 4(3), 340-347. ethics, 23(4), 442-454.
Bromley, E., Mikesell, L., Jones, F., & Khodyakov, D. (2015). Qu, S. Q., & Dumay, J. (2011). The qualitative research interview.
From subject to participant: Ethics and the evolving role of Qualitative research in accounting & management, 8(3), 238-
community in health research. American journal of public 264.
health, 105(5), 900-908. Sherif, V. (2018, May). Evaluating preexisting qualitative
Christen, P., Ranbaduge, T., & Schnell, R. (2020). Linking research data for secondary analysis. In Forum: qualitative
sensitive data. Methods and techniques for practical privacy- social research (Vol. 19, No. 2, pp. 26-42). Freie Universität
preserving information sharing. Cham: Springer. Berlin.
Cohen, L., Manion, L., & Morrison, K. (2017). The ethics of Surmiak, A. (2018, September). Confidentiality in qualitative
educational and social research. In Research methods in research involving vulnerable participants: Researchers’
education (pp. 111-143). Routledge. perspectives. In Forum: Qualitative social research (Vol. 19,
Curtin, M., & Fossey, E. (2007). Appraising the trustworthiness No. 3, pp. 393-418). Freie Universität Berlin.
of qualitative studies: Guidelines for occupational therapists. Sutton, J., & Austin, Z. (2015). Qualitative research: Data
Australian occupational therapy journal, 54(2), 88-94. collection, analysis, and management. The Canadian journal
Dennis, S., Garrett, P., Yim, H., Hamm, J., Osth, A. F., Sreekumar, of hospital pharmacy, 68(3), 226-231.
V., & Stone, B. (2019). Privacy versus open science. Behavior Vainio, A. (2013). Beyond research ethics: Anonymity as
research methods, 51, 1839-1848. ‘ontology’,‘analysis’ and ‘independence’. Qualitative
Gibson, S., Benson, O., & Brand, S. L. (2013). Talking about Research, 13(6), 685-698.
suicide: Confidentiality and anonymity in qualitative research. Vandekerckhove, W., & Lewis, D. (2012). The content of
Nursing ethics, 20(1), 18-29. whistleblowing procedures: A critical review of recent official
Giordano, J., O'Reilly, M., Taylor, H., & Dogra, N. (2007). guidelines. Journal of Business Ethics, 108, 253-264.
Confidentiality and autonomy: The challenge (s) of offering Zohrabi, M. (2013). Mixed method research: Instruments, validity,
research participants a choice of disclosing their identity. reliability and reporting findings. Theory and practice in
Qualitative health research, 17(2), 264-275. language studies, 3(2), 254-262.
Guillemin, M., & Gillam, L. (2004). Ethics, reflexivity, and
“ethically important moments” in research. Qualitative
inquiry, 10(2), 261-280.