Professional Documents
Culture Documents
Scientific Integrity - Text and Cases in Responsible Conduct of Research-Francis L. Macrina
Scientific Integrity - Text and Cases in Responsible Conduct of Research-Francis L. Macrina
Integrity
This page intentionally left blank
Scientific
Integrity
FOURTH EDITION
Francis L. Macrina
Edward Myers Professor of Dentistry and
Vice President for Research
VCU Philips Institute for Oral Health Research
Virginia Commonwealth University
Richmond, Virginia
Washington, DC
Publisher’s Note: Scientific Integrity: Text and Cases in Responsible Conduct of Research (Fourth Edition) is
intended to serve as a text for courses and workshops on responsible conduct in scientific research. The
text is not meant in any way to serve as a set of guidelines, rules, or statements officially endorsed by the
American Society for Microbiology or any other scientific organization or institution.
The case studies used throughout this text are hypothetical and are not intended to describe any actual
organization or actual person, living or dead. The opinions in the text, express or implied, are those of
the authors and do not represent official policies of the American Society for Microbiology.
Cover Image: Taken in 2009 by a camera onboard the National Aeronautics and Space Administration
(NASA) Hubble Space Telescope, the image is that of a celestial body designated NGC 6302, a
“planetary nebula.” It is more commonly known as the Butterfly Nebula because of its distinct butterfly
shape. Originally, the term planetary nebula had been used to describe objects, viewable with binoculars
or a small telescope, that have a roundish appearance similar to a planet. However, as revealed by larger
telescopes, planetary nebulas are really stars that have ejected much of their mass during a destructive
phase of their evolution that will lead to their demise. The star in NGC 6302 occurs at the juncture
of the two butterfly “wings” and cannot be seen in the photograph because it is shrouded in dust. The
ejected gases and ultraviolet radiation emanating from the dying star create glowing material that defines
the butterfly shape. More information may be found at: http://www.nasa.gov/mission_pages/hubble
/multimedia/ero/erongc6302.html.
The cover image was downloaded from the NASA web site. It is not copyrighted and is considered in
the public domain by that agency. NASA is hereby gratefully acknowledged for its use. NASA’s image use
policy may be found at: http://www.nasa.gov/audience/formedia/features/MP_Photo_Guidelines.html
#.Uzx7svldWCl
Copyright © 2014 American Society for Microbiology. ASM Press is a registered trademark of the
American Society for Microbiology. All rights reserved. No part of this publication may be reproduced
or transmitted in whole or in part or reutilized in any form or by any means, electronic or mechanical,
including photocopying and recording, or by any information storage and retrieval system, without
permission in writing from the publisher.
Disclaimer: To the best of the publisher’s knowledge, this publication provides information concerning
the subject matter covered that is accurate as of the date of publication. The publisher is not providing
legal, medical, or other professional services. Any reference herein to any specific commercial products,
procedures, or services by trade name, trademark, manufacturer, or otherwise does not constitute or
imply endorsement, recommendation, or favored status by the American Society for Microbiology
(ASM). The views and opinions of the author(s) expressed in this publication do not necessarily state or
reflect those of ASM, and they shall not be used to advertise or endorse any product.
Library of Congress Cataloging-in-Publication Data
Macrina, Francis L., author.
Scientific integrity : text and cases in responsible conduct of research / by Francis L. Macrina, Edward
Myers Professor of Dentistry and Vice President for Research, VCU Philips Institute for Oral Health
Research, Virginia Commonwealth University, Richmond, Virginia. —Fourth edition.
pages cm
ISBN 978-1-55581-661-2 (print) —ISBN 978-1-55581-848-7 (electronic) 1. Research—Moral and
ethical aspects. 2. Medical sciences—Research—Moral and ethical aspects. 3. Integrity. I. Title.
Q180.55.M67M33 2014
174.95—dc23
2014017024
doi:10.1128/9781555818487
and
My mentors
John J. Quinn 1931-2009
Elias Balbinder 1926-2011
and
Contributors xiii
Foreword xv
Michael J. Zigmond and Beth A. Fischer
Preface xxv
Acknowledgments xxviii
Note to Students and Instructors xxix
A Website Companion for Scientific Integrity: Text and Cases in Responsible Conduct
of Research, Fourth Edition xxxii
chapter 3 Mentoring 53
Francis L. Macrina
Overview • Characteristics of the Mentor-Trainee Relationship • Choosing a
Mentor • Foundations of Mentoring • Diversity, Research, and Research
Training • Learning Mentoring Skills • Conclusion • Discussion Questions •
Case Studies • Resources
ix
x Contents
Index 517
This page intentionally left blank
Contributors
xiii
This page intentionally left blank
Foreword
xv
xvi Foreword
raise the issues among your colleagues. And write to the author—you may
play an important part in the development of the next edition!
In this brief Foreword we deal with two issues. We begin by consider-
ing how instruction might best be provided. We then analyze some of the
federal and institutional guidelines that have played an important role in
promoting the introduction of RCR training into academic programs,
suggesting that they are an important driving force for ethics education
but also that they in part have led to some of its most serious—and
contentious—problems.
subject. For this, one needs people with experience in the practice of re-
search, or at least individuals working in a partnership with active research-
ers. And these RCR instructors must treat their task as they would a
research project: by thinking deeply about the subject matter, reading the
literature, seeking advice from others, developing and testing hypotheses
about what will be effective, and finally getting feedback on their own per-
formance as well as the impact they are having on their trainees.
Instruction that does not involve active researchers is unacceptable for
at least two reasons. First, the message provided by courses that do not
involve investigators is that such individuals either do not know enough
about RCR to teach it, or that they do not feel it is worth their time to do
so. Second, non-scientists can be dangerously out of touch with the every-
day reality of practitioners. For example, we have heard instructors say that
all authors of any research paper must have reviewed all of the data and be
able to explain all of the methods used. In theory this sounds entirely rea-
sonable. But a moment’s thought will make clear that such a rule is incon-
sistent with the complex, collaborative, and interdisciplinary nature of
most of today’s research.
In addition to those who direct formal courses in RCR, research group
directors are another critical component of the instruction. Whatever their
intention when they accepted jobs at educational institutions, all too often
these individuals come to view the members of their teams largely as re-
search assistants. Thus, anything that takes their lab members out of the lab
is a distraction from the task at hand, and RCR training often tops the list of
those “distractions.” We understand this; advancement in academia is typi-
cally based on research productivity, not on mentoring. Yet, it goes without
saying (though we will say it), that irresponsible research can never be good re-
search. Research that involves cutting corners or using erroneous statistical
tests, not to mention intentionally manipulating data, may be at the heart of
many failures to replicate published studies that have recently been a focus
of much discussion in both the professional and the lay literature (see, for
example, references 1 and 2). Moreover, whereas courses on RCR—when
they are offered—may involve less than a dozen hours of instruction, often
at the outset of a training program, research advisors influence members of
their groups for thousands of hours over many years. And as we have already
implied, it is the example set by research directors and others in the aca-
demic environment that really counts. Moreover, it is not only the trainees
that they influence, it is all members of their research group.
This brings us to the overriding issue of “climate.” As one would expect,
a corollary of the importance of setting a good example is that the climate
in which research is done has a significant impact. Some 20 years ago, Me-
lissa Anderson, Karen Louis, and Judith Swazey set out to study this topic
as part of the Acadia Institute’s Project on Professional Values and Ethical
xviii Foreword
about RNA editing or the Nernst equation or [fill in the blank], and you
want me to spend 30 hours talking about ethics?!” But teaching about a
specific topic in biology, math, or virtually any other discipline is not the
right analogy. In fact, no one content area provides the right comparison,
for what we must ultimately achieve through RCR education is the devel-
opment of a complex skill: that of being able to reason through an ethical
issue, one that often does not even have a “right” answer.
A far better exercise is to compare approaches for teaching RCR with the
way in which we teach our trainees how to critically evaluate the scientific
literature in their area of research. This is not accomplished in a 1-hour or
even an 8-hour block. We begin by introducing the trainees to some of the
basic concepts of the field. Next we have them participate in “journal
clubs”—in-depth, small group discussions of an individual paper, simple pa-
pers at first, and then increasingly complex ones. The papers are presented,
and the discussions led, by the trainees themselves. From there we move on
to discussions of papers within the research group or even in one-on-one
discussions between the lab director and a specific trainee. And these train-
ees soon begin to write their own papers, for which they must read and
evaluate the literature. Finally, in the case of graduate students, we challenge
them in preliminary exams, comprehensive exams, seminar proposal meet-
ings, and the dissertation defense—all the time probing their understanding
of the literature and their ability to justify their conclusions. As for postdocs,
staff, and faculty, they get challenged, too. It happens each time they make a
presentation. Yes, this process does involve learning some content—the
proper organization of a paper, how to select the right statistical test, the
importance of citing conflicts of interest. But mostly it involves the ability to
critically analyze and then defend a position. Total time? Incalculable. Is do-
ing research responsibly really not as important as being able to critically
evaluate the literature and then defend your position?
Federal guidelines
Federal guidelines vary by agency, though it is not clear why this should
be. Why, for example, does the U.S. National Science Foundation (NSF)
insist that any institution that receives NSF funding have an institution
wide program of RCR training, whereas the NIH requires RCR training
only for individuals supported by training and career awards? Other agen-
cies have their own idiosyncrasies.
The NIH guidelines relating to RCR instruction appeared in 1989, and
most training programs quickly learned that they were required to provide
instruction in research ethics to at least a subset of their trainees. Since
those initial guidelines, the NIH description of an acceptable RCR pro-
gram has gradually evolved. Their most recent recommendations on how
to fulfill their requirement for providing instruction in RCR (6) include an
excellent set of “Basic Principles” that deserve to be read carefully as they
include many of the key characteristics that we believe are critical to devel-
oping a good program.
The guidelines require that active researchers be involved in providing
the instruction, and they specify a minimum number of hours of face-to-
face instruction. But otherwise, they are not overly prescriptive. For ex-
ample, the method of instruction is left open (except that online training
does not count toward the required number of hours of face-to-face in-
struction). Moreover, NIH does not dictate the topics that must be ad-
dressed, but instead suggests nine content areas that “have been incorporated
into most acceptable plans for such instruction.” Theirs is a fine list, though
vague in regard to the scope of some topics. In particular, “research mis-
conduct” is listed but never defined within the guidelines. But its major
failing is in its definition of who must receive instruction: “individuals sup-
ported by any NIH training, research, education, fellowship, or career
award” (6). This, of course, overlooks the great majority of graduate stu-
dents and postdocs, both because the number of such NIH-supported po-
sitions is limited and because a great many trainees are not even eligible
for those positions by virtue of their citizenship. It also omits staff, faculty,
and administrators involved in the research endeavor.
In their 2009 guidelines, the NSF provided much less direction on the
content of RCR training. They also indicated that “training plans are not
required to be included in proposals submitted to NSF,” although they
added “institutions are advised that they [the plans] are subject to review,
upon request.” And most relevant to us, NSF specifies that the “institution
must have a plan in place to provide appropriate training and oversight in
the responsible and ethical conduct of research to undergraduates, graduate
students, and postdoctoral researchers who will be supported by NSF to con-
duct research” (italics added) (7). Staff, faculty, and administrators are not
Foreword xxi
2009 letter to NSF, Richard Marchase, then the president of FASEB, wrote
in regard to NSF’s new guidelines: “Even with access to educational mate-
rials, the implementation and administration of new training programs is
not without cost. NSF should explore ways to fund these efforts so that
additional training requirements do not burden institutions with new, un-
funded mandates” (10). And, now 20 years after the Ryan Commission re-
port was issued, the recommendation of universal training in RCR—which
we wholeheartedly endorse—has not been made part of federal policy.
We recognize the many obligations shouldered by research institutions
as well as professional societies. However, we also believe that providing
training in RCR to everyone involved in the research enterprise is at the
very core of ensuring that all research is done responsibly. That should not
require any federal mandate, funded or not. Yes, institutions are burdened
with an enormous number of requirements. They must ensure the value of
the degrees they award by overseeing the curriculum and the process of
certification. They must ensure fiscal responsibility. They are responsible
for fulfilling the requirements for human and laboratory animal research
and for laboratory safety. And that is just the beginning of the list. Thus, it
is not surprising that many institutions view training in RCR as yet an-
other requirement they need to check off, and that they often do only as
much as they deem necessary to fulfill the requirement. However, research
institutions should never define themselves in terms of the minimum
needed to get by. Fulfilling the mandate to provide training in RCR cannot
not be viewed as an end but as a means—a means to ensure the highest
level of scholarship.
References
xxv
xxvi Preface
xxviii
Note to Students
and Instructors
xxix
xxx Note to Students and Instructors
designed for use with anywhere from a few to 11 students. Students are
given scripted lines to recite and then must use ad lib presentation to make
their case for (or against) authorship on a proposed manuscript.
The end-of-chapter short cases are designed for classroom use. These
short scenarios are 200 to 400 words and can be read aloud in a few min-
utes. Most of the cases in this book have been used in our courses. Students
are assigned two to three cases from which they select one to present for
discussion to a small group of classmates.
Assigning a case set in advance of the class provides students with the
opportunity to think about their arguments and to have time to do re-
search or to seek consultation on the topic. For example, a student might
want to consult relevant guideline or policy documents. Although many
cases do not require research, they may not work as well if the student has
not been at least indirectly exposed to the research environment. In the
student evaluations of our courses, we have asked what factors were im-
portant in the selection of cases for discussion. Student responses indicate
that two of the most important features are (i) the belief that the case
would promote lively classroom discussion and (ii) the fact that the case
had some personal appeal. That is, students frequently picked cases about
which they had some background knowledge or personal experience.
A student leading the discussion of the case begins by reading it aloud in
class. He or she then acts as the moderator for the rest of the discussion of
the particular case. Discussion of cases is aided by a seating arrangement
that allows everyone in the classroom to see one another (e.g., seating
around a conference table or arranging chairs into a circle or semicircle).
Typical classroom seating arrangements with students facing the front of
the room make it difficult for everyone to see who’s talking, and this incon-
venience can dampen group participation. Case discussions work optimally
in small classrooms, with no more than 10 to 12 students. A typical case
discussion will take 15 to 20 minutes.
Student participation is very important in the process. The instructor—
who is present during the discussion—should serve only as a facilitator,
contributing when clarification is needed, when discussion bogs down, or
when closure on a case is needed. After reading the case, the student pres-
ents his or her impressions, identifying the issues and suggesting a possible
solution. The classroom is then open to discussion, and the students air
their views on the topic without more than one person talking at once.
The instructor or student moderator may have to act as a peacekeeper.
Sometimes disputes arise and discussions can become animated, even
Note to Students and Instructors xxxi
The site is arranged into sections that correspond to the textbook chap-
ters. It features:
• All of the URLs cited in the text, allowing easy user access to online
resources;
• URLs to supplemental materials in all of the chapter topic areas
• Updates on policies and regulations pertaining to research conduct
and RCR education
• PDF files of each of the surveys contained in Appendix I, which can
be printed for classroom use by students and instructors
• Short case discussions providing exemplars that will inform future
case discussants about the scope and depth of the analysis of selected
scenarios.
The website does not require user registration and is not password
protected.
xxxii
chapter 1
Overview
Scientific Integrity: Text and Cases in Responsible Conduct of Research, 4th ed.
by Francis L. Macrina
© 2014 ASM Press, Washington, DC
doi:10.1128/9781555818487.ch1
1
2 Chapter 1
Scientific method
Textbooks teach us that scientific research proceeds according to “the scien-
tific method.” According to this method, a gap in knowledge is identified
and questions are posed. Existing information is studied, and a h ypothesis—a
prediction or educated guess—is formed to explain certain facts. Informa-
tion is gathered, analyzed, and interpreted in the process of testing the hy-
pothesis. Results may support or refute a hypothesis, but a hypothesis cannot
be proved. Indeed, a hypothesis can only be disproved. Further testing of
specific hypotheses and their derivatives strengthens their support and leads
to the genesis of a theory. Theories take into account a strongly supported
hypothesis or set of hypotheses and encompass a broadly accepted under-
standing of a natural concept. It follows that, since they are based on hy-
potheses, theories can eventually be disproved but they cannot be proved.
When hypotheses are not supported, the results obtained are often used to
refine or construct other hypotheses, and the process begins anew. A hy-
pothesis that has been unequivocally rejected on the basis of the interpreta-
tion of experimental evidence can provide the inspiration for a new
hypothesis, which may survive the test of repeated attempts to reject it. The
value of a hypothesis resides in its ability to stimulate additional thinking
and further research, rather than in its initial correctness.
Henry Bauer has written about what he terms the “myth of the scientific
method.” He contends that scientific research rarely proceeds by the orga-
nized, systematic approach that is reflected in textbook presentations. Ap-
proaches to solving problems and answering questions involve various
blends of empiricism and theorizing. Depending on the scientific discipline
and on the intellect and personality of the scientist, research is conducted
with considerable variations on the scientific method. Bauer argues that sci-
ence varies immensely in its characteristics, and he proposes two categories:
textbook science and frontier science. Textbook science has withstood the
scrutiny of time and is not likely to be subject to frequent change. Frontier
science is often termed “cutting-edge” science. It is volatile, sometimes un-
reliable, and subject to considerable change. Bauer correctly points out that
textbook science fails to reveal the true workings of scientific exploration,
because it teaches us only about successful science. Hence, it is not an accu-
rate portrayal of the often convoluted pathway that leads to accepted and
relatively stable scientific results. Such end products of research are com-
monly the result of several experimental pursuits that use different lines of
intellectual thought and technological approaches. Such efforts can occur
over long periods of time, during which corroborative or contradictory evi-
dence must be addressed and, where necessary, reconciled. Textbook science
evolves to a point of general acceptance with the caveat that future knowl-
edge may further refine, modify, or even disprove it. To attempt to explain
6 Chapter 1
Reporting science
In 1963, Sir Peter Medawar wrote a provocative essay entitled “Is the Scien-
tific Paper a Fraud?” Referring to scientific communications published in
journals, Medawar’s use of the word “fraud” refers to misrepresentations of
the thought processes that led to the work reported. He points out that the
results section is written to present facts without any mention of signifi-
cance or interpretation. These are saved for the discussion section. Medawar
snickers that this is where scientists “adopt the ludicrous pretense of asking
yourself if the information you have collected actually means anything” and
“if any general truths are going to emerge from the contemplation of all the
evidence you brandished in the section called ‘results’.” Here, Medawar is
attacking the idea that scientific discovery proceeds by an inductive process
in which unbiased observations are made and facts are collected. From these
experimental raw materials, generalizations emerge. He concludes that this
inductive format of scientific reporting should be discarded, because it fails
to convey the fact that experimental work begins with an expectation of the
outcome. This bias extends to which investigational methods are chosen or
discarded, why certain experiments are done and others are not, and why
some observations are considered to be relevant while others are not. Many
8 Chapter 1
So, what if you decided to dismiss the usual modus operandi of scientific
manuscript writing and relate the work exactly as it happened? For open-
ers, you might begin your paper with the words “This is the story . . .” Jon
Beckwith and his colleagues did exactly that in a manuscript in which they
believed that describing the tortuous history of the project would provide
a perspective that would be instructive to the reader. Beckwith relates the
reaction to this paper, citing comments of the referees who variously re-
ferred (negatively) to the manuscript as a “personal memoir” and a “fairy
tale,” written in “the exotic style of a story.” Beckwith says that although
the stylistic issues may not have been the principal reason, the paper was
rejected by two journals. The paper ultimately was published in the Pro-
ceedings of the National Academy of Sciences. Although we’d be hesitant to
make a sweeping conclusion from a single “experiment,” the prospects for
this style of writing catching on don’t seem to be looming on the horizon.
For the time being, we expect that scientific papers will continue to read
like paragons of logic. They’ll describe cleverly crafted experimental ap-
proaches applied in the most timely and compelling ways. But, in keeping
with Goodstein’s “myth of the noble scientist,” scientific papers for the
most part will not represent the true chronology of events or the intrica-
cies of assembling and interpreting facts that have led to the conclusions.
We won’t expect to read about the wrong turns, dead ends, and “broken
test tubes” that may have been crucial to the overall body of work. Scien-
tific papers rarely describe or put into perspective the pure luck and mis-
takes that were also part of the work being reported. Frederick Grinnell,
discussing the writing of Medawar, describes the scientific paper’s purpose
and in doing so provides us with some closing perspective: “Other re-
searchers will expect to be able to verify the data and the conclusions, not
the adventures and misadventures that led to them.”
Scientific Misconduct
Historical perspective
Questionable or controversial behavior by scientists is not confined to
modern times. Louis Pasteur’s pioneering work in the 1880s led to the
development of effective vaccines for anthrax and rabies. An examination
of Pasteur’s data books revealed that the anthrax vaccine used in a famous
inoculation trial on sheep was prepared by a chemical inactivation method
developed by his competitor, Henri Toussaint. But publicly, Pasteur
claimed that in these trials he employed his own method, which used oxy-
gen to inactivate the anthrax bacilli. In the early 1900s, Robert Millikan’s
selective publication of data on the electric charges of oil drops led to an
understanding of the particulate nature of electric charge. Millikan intui-
tively discounted data involving the migration of electrically charged oil
10 Chapter 1
drops that did not conform to his expectations, because they had “some-
thing wrong” with them. Scholarly writings on this subject abound. Some
have argued that Millikan was simply exercising scientific judgment. Oth-
ers disagree. Most recently, David Goodstein in his book On Fact and
Fraud: Cautionary Tales from the Front Lines of Science retells the story in
detail based on his examination of Millikan’s data books. The debate about
Millikan’s experiments centers on whether or not he published all of his
data. At issue is not that Millikan discarded certain data gathered from
some of the oil drops, but that in his published work on the subject he
wrote that he presented all of his available data. Goodstein asserts, based
on his firsthand analysis of Millikan’s recorded data, that “a careful reading
of Millikan’s words in context greatly diminishes their apparent signifi-
cance as evidence of misconduct.”
Investigation and prosecution of several cases of alleged scientific mis-
conduct in the last decades of the 20th century significantly increased
awareness of such matters. Facilitated by widespread print and electronic
reporting, the high-profile nature of these cases caught the attention of
reporters, politicians, scientists, and the public. The public’s eyes were
opened to the potential existence of scandal in science! The public recog-
nized that science could fall victim to the unethical and inappropriate ac-
tions of some of its practitioners. The importance of this issue was
underscored in the early 1980s with congressional hearings on fraud in
biomedical research. During this decade, some congressional members ag-
gressively pursued certain cases, further fueling zealous media coverage.
Today, reports on alleged misconduct in science appear with regularity in
the electronic and print media. Televised “news magazine” programs have
featured ongoing and closed cases, and a variety of websites and online
blogs specialize in the topic of “scientific fraud.” Newspapers, magazines,
and trade publications run stories on cases and commentaries on the topic.
And a number of the cases have been memorialized in books.
These high-profile cases prompted a federal response that was mani-
fested in policy development, the creation of new requirements, and in the
passage of new laws. In 1985, the U.S. Congress passed the Health Research
Extension Act. Although almost all of this law is concerned with the organi-
zation and authority of the National Institutes of Health (NIH), Section
493 addresses scientific conduct. This section is titled “Protection against
Scientific Fraud,” and it mandates that any entity receiving financial support
from the NIH must have an established administrative process to review
reports of scientific fraud. Reporting “substantial” investigations of alleged
scientific fraud is also a requirement. Furthermore, it mandated that the di-
rector of NIH establish a “process for the prompt and appropriate response
to information” concerning scientific fraud for any funded project. Finally, it
authorized “taking appropriate action with respect to such fraud.”
Methods, Manners, and the Responsible Conduct of Research 11
In 1989, the Public Health Service (PHS) created the Office of Scien-
tific Integrity in the Office of the Director of the NIH (an agency of the
PHS) and the Office of Scientific Integrity Review in the Office of
the Assistant Secretary for Health. The NIH Revitalization Act of 1993
combined both of these offices into a single entity called the Office of
Research Integrity (ORI) and established it as an independent entity
within the U.S. Department of Health and Human Services (DHHS).
This removed the responsibility for processing allegations of misconduct
from funding agencies and placed it under the authority of the ORI. This
act also replaced the term “scientific misconduct,” which had already re-
placed “scientific fraud,” with “research misconduct.” Two other seminal
events occurred in 1989. First, the NIH announced a requirement that “a
program in the principles of scientific integrity be an integral part of the
proposed research training” for all National Research Service Award in-
stitutional training grant applications, effective July 1, 1990. All activities
relating to instruction in the responsible conduct of research had to be
described in the application. Second, a report titled The Responsible Con-
duct of Research in the Health Sciences, prepared by the Committee on the
Responsible Conduct of Research, was published by the Institute of
Medicine. In response to its charge, the committee discussed issues per-
taining to standards of research and the process of investigation of alle-
gations especially in light of the emergence of federal regulations in the
late 1980s. It also addressed the need for mechanisms to promote ethical
standards in research. The committee developed 16 recommendations
aimed at three different sectors of the research enterprise: recommenda-
tions for the NIH, recommendations for universities and other research
centers, and recommendations for professional organizations and scien-
tific journals. The common recommendations across each of these groups
were that they develop policies, standards, and practices to promote and
ensure the responsible conduct of research.
The NIH Revitalization Act also mandated the formation of a Commis-
sion of Research Integrity to review the research enterprise and advise the
Secretary of Health and Human Services and the U.S. Congress about
ways to improve the PHS response “to misconduct in biomedical and be-
havioral research receiving NIH funding.” The committee’s 1995 report,
Integrity and Misconduct in Research, became commonly known as the Ryan
Commission Report, after Kenneth J. Ryan, the chair of the commission.
Among its recommendations, the committee called for a uniform federal
definition of research misconduct; a whistle-blower’s bill of rights; ex-
panded federal requirements for education in responsible research con-
duct; the development of codes of ethics by professional societies; and
defined processes in oversight, investigation, and adjudication of allega-
tions and in the imposition of sanctions.
12 Chapter 1
This definition was part of the OSTP federal research misconduct policy
and applied to all federally funded research. This policy did not limit au-
thority of research institutions or other entities “to promulgate additional
research misconduct policies or guidelines or more specific ethical guid-
ance.” Indeed, a number of federal agencies that conduct or fund research
have published their own definitions of research misconduct. We’ll review
Methods, Manners, and the Responsible Conduct of Research 13
the current research misconduct definitions used by the NIH and the
National Science Foundation (NSF) at the end of this chapter.
Today, definitions of scientific misconduct typically forbid fabrication,
falsification, and plagiarism. Fabrication is making up data; falsification is
any manipulation that introduces inaccuracies into the research record; and
plagiarism is using someone’s ideas, processes, results, or words without giv-
ing attribution or credit. Definitions containing phraseology that catego-
rizes deviations from accepted scientific practices as misconduct continue to
promote debate in the scientific community. The notion that there are ac-
cepted practices causes problems for some as it treads on the previously
mentioned arguments of the use of intuition and the importance of trust in
the research process. Early in the debate, Howard Schachtman, then presi-
dent of the Federation of American Societies of Experimental Biology, said
in congressional testimony that
It is our view that this language is vague and its inclusion could discourage
unorthodox, novel, or highly innovative approaches, which in the past have
provided the impetus for major advances in science. It hardly needs pointing
out that brilliant, creative, pioneering research deviates from that commonly
accepted within the scientific community.
Incidence of misconduct
Scientists commonly assert that misconduct in research is rare. However,
news reporting today frequently suggests that the incidence of misconduct
is on the rise. What baseline information can we use to make such a mea-
surement? Scholarly writings and analyses on this topic generally fall into
two categories: (i) comparing the number of misconduct cases or events to
some estimate of the number of practicing or funded researchers and (ii)
conducting surveys that directly ask scientists if they have committed
14 Chapter 1
misconduct or know of someone who has. Let’s examine in turn how each
of these informs the scope of the problem.
Nicholas Steneck, in ORI Introduction to the Responsible Conduct of Research,
used a 10-year window of data to compare confirmed cases of misconduct to
the total number of funded researchers. In his assessment, he combined mis-
conduct cases handled by the PHS-ORI and the Office of the Inspector
General of the NSF (NSF-OIG). Public records allow the capture of the
number of confirmed misconduct cases from both agencies, and the num-
bers of funded investigators in each year may be obtained from agency data-
bases. Over a decade that began in the mid-1990s, Steneck posited the
annual occurrence of misconduct in research to be approximately 0.01%.
But he cautions that this value is likely affected by underreporting of mis-
conduct in general. That is, researchers failing to report inappropriate be-
havior will have an impact on the number of convictions for research
misconduct. Other factors that could affect this assessment include allega-
tions of misconduct that are incorrectly dismissed following a preliminary
inquiry and the approximation of the number of researchers used in the
calculation. For example, a funded researcher may oversee several pre- and
postdoctoral trainees, and this amplification would not be reflected in the
assessment. Taking this low frequency to mean that research integrity is
necessarily high is potentially flawed. Specifically, Steneck cautions that at-
tempts to quantitate misconduct yield a value that is a minimum threshold.
In fact, the overall health of the research enterprise depends on adherence
to conduct that is guided by many different policies, regulations, laws, and
best practices. Looking at recent data reveals that Steneck’s assessment has
not changed as we move through the early years of the second decade of the
millennium. In aggregate, numbers of confirmed cases by the PHS-ORI
and the NSF-OIG continue to display similar patterns in the several years
since the Steneck analysis. The total number of misconduct findings still
averages between 20 and 30 a year, with each agency occasionally reporting
more than a dozen annual confirmed cases. The number of funded research-
ers has increased during recent years, which would also lower the previously
obtained value. In summary, using this approach to estimate the frequency
of misconduct has pitfalls that can create a misleading, if not inaccurate, es-
timation. Steneck’s use of “assessment” to express the result of his study is
prudent and appropriate. This approach is important because it provides
context and perspective, not because it offers an indisputable value of the
frequency of misconduct incidence.
This perspective clearly demonstrates that research misconduct is a re-
ality occurring at relatively stable baseline levels. It is further illuminated
by examining the annual reports of the ORI for the number of reported
allegations and the number of inquiries and investigations processed by
that agency. The average annual number of the allegations during the pe-
riod from 2001 to 2010 was 212, which was 23% higher than for 1994 to
Methods, Manners, and the Responsible Conduct of Research 15
2000. In a different comparison using the same time frames, the number of
inquiries and investigations jumped 88%, from 45 to 85 per year.
In the past 2 decades, there have been at least two dozen published re-
ports on surveys designed to examine the landscape of research conduct and
misconduct. Such publications variously report researchers’ admission of
committing misconduct, considering misconduct, or witnessing others
commit acts of research misconduct. Attitudes toward defined behaviors,
questionable or otherwise, have also been probed. The target cohorts across
these surveys have varied and have included trainees as well as scientists at
different chronological stages in their careers. Issues that have been raised
with interpreting survey results are manifold and can be controversial. For
example, published surveys of trainees and scientists frequently reveal a frac-
tion of respondents who claim that they have observed scientific misconduct
at some time in their careers. But such studies are subject to the criticism
that participant responses depend on personal knowledge, perceptions, and
interpretations that may differ enormously according to the training and
professional experience of the individual. Responses of participants can also
depend on the wording of survey items. For example, an item may have
ambiguous meaning or may be missing needed context that would cast the
validity of the response into doubt. Another example would be a survey item
that lumps together multiple components of differing value but requires an
absolute answer. Consider the case where a survey item has mixed three ele-
ments, X, Y, and Z. X and Y are consistent with unacceptable behavior, but Z
may be deemed appropriate behavior. In the case where the response is
based on Z, the association with X and Y yields a result that was not in-
tended by the survey participant. Thus, interpretation of surveys that collect
self-reported information or attitudes must be carefully done. Statistical
analysis must be rigorous, but equally important, the actual survey items and
background or instructional narrative provided to the respondents must be
critically examined. These caveats aside, survey data repeatedly suggest that
scientists and trainees admit to contemplating, committing, or observing
misconduct. The levels of these reported activities have differed from survey
to survey, and intersurvey comparisons have been difficult owing to a num-
ber of variables. However, Daniele Fanelli published a metastudy in 2009
using 18 different surveys. His approach was to extract information from
each of the surveys yielding responses that indicated behaviors or observa-
tions of behaviors that distorted scientific knowledge, namely fabrication
and falsification. He concluded that 1.97% of those surveyed admitted to
fabricating or falsifying data at least once. Fourteen percent answered that
they had observed such behavior in colleagues. About one-third of the sci-
entists in his analysis admitted to committing questionable research prac-
tices less serious than fabrication or falsification.
The PHS-ORI and the NSF-OIG investigate scores of misconduct al-
legations every year. Such investigations have led to the conviction of
16 Chapter 1
Perpetrators of misconduct
Arthur Caplan suggests that one who would lie about research data or steal
someone else’s ideas suffers from failed morals. Training and appropriate
socialization in the norms of scientific research are not likely to sway such
an individual. And preventing such individuals from entering the research
arena or weeding them out once they’re in place would be challenging.
So who would perpetrate an act of scientific fraud? In this area we are
long on speculation and short on well-supported conclusions. Sir Peter
Medawar may have summed it up in the fewest possible words. In writing
about a case of scientific misconduct, he sought some lesson or truth from
the incident but in the final analysis concludes that “it takes all sorts to make
a world.” Another Nobel laureate, Salvador Luria, suggests that a peculiar
pathology exists in the personality of one who would cheat in science. He
argues that only a distorted sense of reality could account for someone who
would falsify or fabricate results. Thinking one could get away with such
behavior in science, where external and internal control measures continu-
ally demand verification, would be a delusion. Goodstein has studied a num-
ber of cases of scientific fraud and offers three frequently underlying motives
or risk factors: (i) career pressure, (ii) the belief that one “knows” the answer
and can take shortcuts to get there, and (iii) the notion that in some fields
experiments yield data that are not precisely reproducible.
Goodstein’s notions provide an interesting substrate for investigating
drivers of misconduct. The metastudy of Fanelli lends support to the “ca-
reer pressure” hypothesis. He found that papers published by U.S. scien-
tists are more likely to report “positive” results—i.e., support for a
Methods, Manners, and the Responsible Conduct of Research 17
online (see Resources, Online, below). Both were inspired by the 2000
OSTP definition mentioned earlier in this chapter. The PHS definition is:
Research misconduct means fabrication, falsification, or plagiarism in pro-
posing, performing, or reviewing research, or in reporting research
results.
(a) Fabrication is making up data or results and recording or reporting
them.
(b) Falsification is manipulating research materials, equipment, or pro-
cesses, or changing or omitting data or results such that the research
is not accurately represented in the research record.
(c) Plagiarism is the appropriation of another person’s ideas, processes,
results, or words without giving appropriate credit.
(d) Research misconduct does not include honest error or differences of
opinion.
The core wording of the PHS and NSF definitions is almost identical,
with the exception of some specific references to the NSF in its definition.
Both contain the assertion that honest error and differences of opinion do
not constitute research misconduct. Both agency documents have exten-
sive narrative on the investigation and prosecution of research misconduct.
Both deal with reporting requirements, initial handling of allegations, and
the roles of these federal agencies relative to that of the institution at which
the allegation has occurred. These federal agencies place the responsibility
for identification, investigation, and adjudication of misconduct allegations
with the institution. However, the PHS and the NSF have the right to re-
view both the process and findings of the institution. Both agencies also
may forward allegations to other federal agencies, and they may respond
directly to an allegation—i.e., conduct their own investigation.
It should be noted, however, that institutions that accept PHS or NSF
funding are mandated to have their own policies in place for dealing with
research misconduct. The ORI offers a model policy on its website for
guidance to institutions in preparing their own policies. Scientists and
trainees should be familiar with their own institution’s policy. Briefly
stated, such policies typically allow for anyone to bring an allegation to the
institution. Reporting an allegation triggers a series of actions that begin
with an inquiry-based process in which fact-finding is meant to establish
whether a full investigation should be launched. If the inquiry panel finds
Methods, Manners, and the Responsible Conduct of Research 21
Conclusion
The practice of science has always encompassed values that include honesty,
objectivity, and collegiality. The progress of modern-day science reflects the
success of the research enterprise. There is nothing fundamentally wrong
with the conduct of science. However, emphasis on the workings of science
and the conduct of scientists has shifted considerably in recent years. Gov-
ernmental oversight and definitions of scientific misconduct sometimes lead
one to believe that scientific integrity is a new concept. It is not. In this book,
we strive to provide existing and emerging thinking and resources about the
responsible conduct of research. As part of this learning process, we aim to
challenge the student with cases that require a problem-solving approach.
Bertrand Russell made a cogent point. To paraphrase him, we trace “the evils
of the world” to moral defects and lack of intelligence. We know little about
eliminating moral defects and unethical behavior, but we can improve intel-
ligence through education. So we seek to improve intelligence rather than
morals. Russell’s argument is relevant to the teaching of scientific integrity.
Both practicing scientists and scientists-in-training must continually exam-
ine the subject and standards of responsible conduct of research. The prac-
tice of their science needs to adhere to those mandated and accepted
standards. Where appropriate, scientists need to play a role in refining exist-
ing standards and contributing to the development of needed standards.
Discussion Questions
Resources
Print
Barnbaum DR, Byron M. 2001. Research Ethics: Text and Readings. Prentice-Hall,
Inc., Upper Saddle River, NJ.
Bauer H. 1992. Scientific Literacy and the Myth of the Scientific Method. University of
Illinois Press, Chicago, IL.
Beckwith J. 2002. Making Genes, Making Waves: A Social Activist in Science. Harvard
University Press, Cambridge, MA.
Brenner S. 2001. My Life in Science. Science Archive Limited, London, United
Kingdom.
Brenner S, Jacob F, Meselson M. 1961. An unstable intermediate carrying infor-
mation from genes to ribosomes for protein synthesis. Nature 190:576-581.
Bulger RE, Heitman E, Reiser SJ. 2002. The Ethical Dimensions of the Biological
and Health Sciences, 2nd ed. Cambridge University Press, New York, NY.
Caplan A. 1998. Due Consideration: Controversy in the Age of Medical Miracles. John
Wiley & Sons, Inc., New York, NY.
Committee on Science, Engineering, and Public Policy. 2009. On Being a Sci-
entist: A Guide to Responsible Conduct of Research, 3rd ed. National Academies
Press, Washington, DC. http://www.nap.edu/openbook.php?isbn=0309119707.
Crewdson J. 2002. Science Fictions: A Scientific Mystery, a Massive Cover-up, and the
Dark Legacy of Robert Gallo. Little, Brown, and Company, Boston, MA.
D’Angelo J. 2012. Ethics in Science: Ethical Misconduct in Scientific Research. CRC
Press, Boca Raton, FL.
Elliott D, Stern JE (ed). 1997. Research Ethics: A Reader. University Press of New
England, Hanover, NH.
Fanelli D. 2009. How many scientists fabricate and falsify research? A systematic
review and meta-analysis of survey data. PLoS One 4:e5738. doi:10.1371/journal
.pone.0005738.
Fanelli D. 2010. Do pressures to publish increase scientists’ bias? An empirical sup-
port for US states data. PLoS One 5:e10271. doi:10.1371/journal.pone.0010271.
Geison GL. 1995. The Private Science of Louis Pasteur. Princeton University Press,
Princeton, NJ.
Methods, Manners, and the Responsible Conduct of Research 23
Online
Definitions of Scientific Misconduct
Overview
Scientific Integrity: Text and Cases in Responsible Conduct of Research, 4th ed.
by Francis L. Macrina
© 2014 ASM Press, Washington, DC
doi:10.1128/9781555818487.ch2
25
26 Chapter 2
Science as a Profession
given an ethical dilemma, one will often find ethicists who reach differing
conclusions as to the best course of action. The difference of opinion may
be attributable to the fact that each ethicist has tried to solve the dilemma
using a different normative ethical theory. Alternatively, each may have
used a similar ethical theory and yet differed greatly in the amount of
weight each ascribed to the various components of the problem. In addi-
tion, there can be disagreements over the empirical facts of a case (for ex-
ample, whether an animal feels pain during a given procedure). The point
is that moral problem solving, like biological problem solving, is an ex-
tremely complex process, and we should not be surprised to find that dif-
ferent people do not always arrive at the same conclusion.
However, it is equally important to realize that while many ethical di-
lemmas may not have a single “right” answer, there are answers that are
clearly wrong. Who would seriously argue that a coin toss should decide
ethical questions, or that abortions should be considered moral on Mon-
days and immoral on Tuesdays? Ethical positions can be evaluated and
compared using techniques that are not entirely foreign to those in the
sciences. Ethical theories can be evaluated on their rationality, their consis-
tency, and even on their usefulness.
While the evaluation of competing ethical theories is a difficult task, there
are areas of general agreement where we might begin. Ethical theories, like
any other, are expected to be internally consistent. No theory should be al-
lowed to contradict itself. Similarly, theories that are unclear or incomplete
are clearly less valuable than theories that do not suffer from these flaws.
Simplicity could also be considered an advantage. If all else were equal, it
would be preferable to employ a simple theory over one that is complex or
difficult to apply. We should also expect an ethical theory to provide us with
assistance in those dilemmas where intuition fails to give us a clear answer.
Most real-life ethical dilemmas are considered as such precisely because
compelling moral arguments can be made in support of each side of the is-
sue. These types of situations are those in which we most require the guid-
ance of a moral theory. Additionally, ethical theories should generally agree
with our sense of moral intuition. Who would wish to adopt an ethic that,
although consistent, complete, and simple, advocated murder for profit?
However, it is more difficult to decide about a theory that runs counter to
our moral intuition in an area less clear-cut than murder, or in a number of
minor areas. This is where the evaluation process becomes extremely diffi-
cult. How are we to decide whether it is the theory or our intuition that is
out of line? We may decide that if a theory is rational, is well designed, and
gives answers that correspond to our moral intuition on a large range of is-
sues, then in a particular instance it is our intuition that is in error.
Those in the natural sciences have something of an advantage over
moral philosophers. Usually, we can design an experiment to discern which
32 Chapter 2
Utilitarianism
Ethical theories are generally divided into two major categories. The first
of these is called either teleological or consequentialist, and the second is
referred to as deontological. Teleological theories focus exclusively on the
consequences of an action in order to determine the morality of that ac-
tion. Thus, to determine if a particular act is moral or immoral, one deter-
mines whether the consequences of that act are considered good or bad.
Those theories that do not exclusively evaluate the consequences of an act
to determine its morality are called deontological. Deontological theories,
considered in the next section, are commonly referred to as “duty-based,”
in contrast to the “outcome-based” nature of teleological-consequentialist
theories.
The best-known example of a teleological theory is utilitarianism. Jer-
emy Bentham (1748–1832) was the first person to articulate the theory
under that name, and John Stuart Mill (1806–1873) was also influential in
its development. Utilitarianism acknowledges the fact that many acts do
not produce purely good consequences or purely bad consequences, but
some combination of the two. To decide whether a particular act is moral,
a person must sum up all of the consequences, both good and bad, and as-
sess the net outcome. Moral actions are those that cause the best balance of
good versus bad consequences.
In addition, utilitarianism requires a person to consider the interests of
everyone. It is not permissible to merely consider what is best for you
personally. Suppose that you are considering lying about the results of an
experiment that you have performed. You reason that lying about the ex-
periment will greatly increase the chance of your paper’s being accepted
into a prestigious journal. This will, in turn, enhance your career, your
salary, and your family’s security. However, utilitarianism requires that
you also consider the impact of your decision on other people. You must
Ethics and the Scientist 33
consider the fact that the scientists who read your paper and are misled
by its fabricated results may be harmed by your decision. Some of them
may decide to initiate a new series of experiments or to cease a line of
investigation based on your fabricated data. This can result in wasting
precious resources. If your research has direct clinical relevance, it is pos-
sible that patients may be directly injured or killed by your deceit. If you
are caught in your lie, still more harm will accrue both to you directly and
to the public’s confidence in science. If you consider the cumulative neg-
ative impact of your lying, and not just the positive benefits that you are
seeking, it will become apparent that the net outcome is a bad one. Ac-
cording to utilitarian theory, this act of deceit is immoral and you ought
not to carry it out.
Now let’s imagine a very different situation. A relative of one of your
colleagues has escaped from a mental institution and shows up at the lab
where you both work. Waving a scalpel and screaming that he wants to kill
your friend for “ruining his life,” he asks you to tell him where she is work-
ing. Although you know exactly where she is, what should you do? After
performing the same type of utilitarian calculus as above, it is clear that
you should lie to the escaped patient. The good and bad consequences that
will flow from this particular act of deceit provide a net outcome that is
markedly different from that in the previously described scenario. Thus, in
utilitarianism we find ethical decisions that change as circumstances
change. An act that is deemed immoral under one set of circumstances can
become morally obligatory under another. But exactly what are we to con-
sider when we try to evaluate good and bad consequences? According to
Mill, the only good is happiness and the only bad is unhappiness. Bentham
thought that pleasure was the only good and that pain was the only bad.
These terms are defined somewhat more broadly than you might imagine.
Pleasure includes satisfaction of desires, attainment of goals, and enjoy-
ment, while pain includes, in addition to physical discomfort, things such
as the frustration of one’s goals or desires.
Utilitarianism, like all other ethical theories, has its critics. One criti-
cism is that it is excessively burdensome to employ. Utilitarianism requires
that we all evaluate how each of our actions will impact everyone. How is
it possible to actually do this? How is it possible to predict the conse-
quences of even a fairly simple action on everyone? If we are required to
do this for each of our actions, how will we be able to get anything accom-
plished? The advice to use our common sense does not seem to be very
helpful. Another criticism of utilitarianism is that it would appear to con-
done, or even mandate, some actions that most of us would find horren-
dous. Suppose we find a patient who has a lymphoma that is producing a
substance of tremendous use in the treatment of AIDS. However, the pa-
tient is totally uncooperative, refusing either to accept treatment for his
34 Chapter 2
Deontology
integrity in their research. At the same time, they may include specific re-
sponsibilities that address a range of topics from authorship credit to im-
plications of conflicts of interest.
Many universities and research institutes also affirm their commitment
to responsible conduct in research through their own internal policies.
Such policies may be found on the institution’s website, and an example of
a federal research institute guideline for the conduct of research is found in
Appendix III. This policy of the National Institutes of Health is specific to
that agency’s research mission of biomedical, life science, and health-
related research. University policies are typically broader as they address
research and scholarship across an institutional array of disciplines that
may span a variety of sciences, engineering, the humanities, and the arts.
Early in the first decade of this millennium, publications began to ap-
pear that listed values, norms, and recommendations for responsible re-
search conduct. This trend continues and has given rise to a foundation of
material that serves to provide ethical guidance for scientists augmenting
the codes of professional societies and individual institutions. Sources of
such material include government agencies, national scientific academies,
private and independent research councils, and independent scholarly
writings. The “Resources” section of this chapter presents a selected list of
several of these publications with links or citations to provide access to any
of the complete works. The following presents an edited compilation of
overarching concepts and commonly occurring elements taken from many
of these cited readings.
Integrity in research is envisioned as a collective responsibility of the
community of science. It is useful to think of integrity at the level of the in-
dividual scientist as well as at the level of the institution. At the level of the
individual, scientists must embrace the values and best practices of respon-
sible research, apply them habitually, and pass them on to trainees through
instruction and by example. The responsibility of institutions in promoting
responsible research centers on establishing and maintaining a culture that
is predicated on standards, trust, and compliance. Compliance means not
only adhering to laws, policies, and regulations but providing education
needed to facilitate that compliance.
The Council of Canadian Academies’ Expert Panel on Research Integ-
rity report defines research integrity as “the coherent and consistent ap-
plication of values and principles essential to encouraging and achieving
excellence in the search for, and dissemination of, knowledge.” The re-
port’s definition goes on to invoke values that include honesty, fairness,
trust, accountability, and openness. These have been frequently cited in
independent writings that have added yet other values to the list. These
publications include The European Code of Conduct for Research Integrity, the
Irish Council for Bioethics’ Recommendations for Promoting Research Integ-
rity, the Australian Code for the Responsible Conduct of Research, the Singapore
Ethics and the Scientist 37
The cases in this book will challenge you to analyze situations and make
decisions based on information and evidence. Many of them will also re-
quire you to employ moral reasoning to reach your decision. But as men-
tioned earlier, using intuition or basing your solution on your feelings alone
40 Chapter 2
Conclusion
Discussion Questions
1. Are there moral values that are unique to the conduct of scientific
research? Describe them and their implications in terms of doing
research responsibly.
2. Should scientists be accountable for their choice of research pursuits
if their published results are used by others for evil purposes?
3. Do you believe that some kinds of scientific research should be for-
bidden? If you do, provide examples.
4. Do scientists have a moral obligation to explain the implications of
their research to society? Why?
42 Chapter 2
Case Studies
Case 2.1 below deals with research ethics as generally discussed in chapters
1 and 2. The remainder of the cases correspond to the topic areas covered
in chapters 3 to 11. Try your hand at solving these cases even before cover-
ing the material in the subsequent chapters. Then return to the case after
reading the appropriate chapter and having classroom discussion of the
topic, and solve the case again. Discuss any differences between your two
solutions.
Mentoring (chapter 3)
air samples, Ashton arrives to do some work. You notice she is not her
usual cheerful self; in fact, she seems frenzied, almost manic racing around
the lab. While working at your bench, you glance over and notice Ashton
taking several pills from a bottle without a prescription label. Concerned
that she may be ill, you ask Ashton how she is feeling. Ashton hastily tells
you that she is not sick and the pills in the bottle are for a migraine. When
you suggest she take the afternoon off to help relieve her headache, she
becomes defensive, telling you she does not have time to go home and rest.
You are not the only one who has noticed a change in Ashton. In fact, you
have had several other graduate students tell you that they have seen Ash-
ton taking pills from a bottle regularly, and many have commented on her
mood swings. As Ashton’s mentor, how would you handle this situation?
What, if any, actions need to be taken?
2.3 An East Coast geneticist and a West Coast biochemist are engaged
in a productive, well-defined collaborative project. The geneticist
prepares an abstract, approved by his collaborator, for submission to a large
international genetics meeting. The scientific content of the abstract reflects
equal contributions of both collaborators. Within 1 month, the biochemist
prepares an abstract of the same work to be submitted to a national bio-
chemistry meeting. The two abstracts have different titles and different
wording, but they report the same experiments and same results and inter-
pretations. The abstracts submitted to both of these meetings will be pub-
lished in journals of the respective societies as “meeting proceedings.” Have
these investigators acted appropriately in reporting their research?
2.5 Myron Castillo is a new graduate student in Dr. Jessica Ripka’s lab.
Dr. Ripka instructed Myron to complete the university animal
training program within his first 2 weeks of being in the lab. Six weeks af-
ter Myron begins his lab work, Dr. Ripka personally begins training My-
ron in performing specialized injections in rats being used in her research.
During an injection, Myron is bitten by one of the rats, resulting in a sig-
nificant laceration of his thumb. Dr. Ripka instructs Myron to go to the
student health clinic where he was screened for possible animal allergies at
the conclusion of his animal-use training. Myron confesses that he has not
had time to complete the animal-use training, nor has he been screened for
allergies at the student health clinic. Dr. Ripka chastises Myron for failing
to tell her he had not completed the training and for not disclosing this
before engaging in the specialized injection training with her. Dr. Ripka is
worried that if Myron goes to the student health clinic, the report that will
ensue from the visit will be filed with the institutional animal care and use
committee. She fears this will lead to sanctions being placed on her animal-
use authorization, thus impeding her research progress. She instructs My-
ron to get the bite wound sutured at the emergency room of a nearby
community hospital. Later in the day, Dr. Ripka shares the incident and
her response to it with you over a cup of tea. She asks you if she did the
right thing. What is your analysis of the situation, and what do you tell
her? If she has not acted appropriately, what should she have done?
2.6 Professor Ella Blackfeather has just published a new book on sta-
tistics for social scientists. She wants to use the book as a text in her
undergraduate course in social science methods. Ella has a lucrative roy-
alty deal based on book sales, and the book is relatively expensive, retailing
for $150. The course she teaches is popular and typically enrolls about 200
students. She knows that use of the book in her course will generate a
handsome royalty. There are similar texts on the market, but she considers
hers to be superior to the competition in terms of content and instruc-
tional format. She is a faculty member at a private university that does not
have an explicit policy on faculty-authored textbook use, but several of her
faculty colleagues use texts they have authored in their own courses. Con-
templating her decision, she comes to you for advice. She asks you to com-
ment on the pros and cons of using her text. What, if any, conflict-of-interest
issues may emerge from the use of her book? If she decides to use the
book, are there things she can do to mitigate or manage concerns that
Ethics and the Scientist 45
might arise? What are they? Ultimately, what advice do you give her about
using her text in her course?
2.9 Ming Shu, biochemistry graduate student from China, can speak
and write in English, but her speed at each task is relatively slow.
46 Chapter 2
Every few weeks Dr. Andrekia Keys, Ming’s graduate mentor, meets with
her to discuss research and to generally inquire as to how her transition
into academic life in the United States is progressing. This week Dr. Keys
asks Ming to leave her research notebooks out so that she can stop by the
lab and inspect them. When Dr. Keys arrives at the lab, Ming has left for
the day, but she finds the notebooks lying on her desk. Upon inspection,
she finds that several of the notebooks are written in Chinese. Upon fur-
ther investigation, she discovers that Ming is recording her initial obser-
vations in Chinese in one notebook and then translating them into
English at a later time. Furthermore, when Dr. Keys examines both sets of
notebooks, she observes that the current English notebook is approxi-
mately 3 weeks behind the Chinese counterpart. Dr. Keys comes to you
for advice. Is Ming guilty of improper notebook-keeping practices? Can
the notebooks written in English be considered valid records of her re-
search thus far? What advice on how to handle this situation do you have
for Dr. Keys?
Jacob taking any personal risks in having his DNA analyzed? If so, what
are they?
Resources
Print
Bebeau MJ, Pimple KD, Muskavitch KMT, Borden SL, Smith DH. 1995.
Moral Reasoning in Scientific Research: Cases for Teaching and Assessment. Poynter
Center for the Study of Ethics and American Institutions, Indiana University,
Bloomington, IN. http://poynter.indiana.edu/files/8713/4572/7960/mr.pdf.
Expert Panel on Research Integrity. 2010. Honesty, Accountability and Trust:
Fostering Research Integrity in Canada. The Council of Canadian Academies,
Ottawa, ON, Canada.
http://www.scienceadvice.ca/uploads/eng/assessments%20and%20publications
%20and%20news%20releases/research%20integrity/RI_report.pdf.
Goldman AH. 1980. The Moral Foundations of Professional Ethics. Rowman and
Littlefield, Totowa, NJ.
Johnson DG. 2009. Computer Ethics, 4th ed. Prentice Hall, Inc., Upper Saddle
River, NJ.
National Academy of Sciences. 1992. Responsible Science: Ensuring the Integrity of
the Research Process, vol. I. National Academies Press, Washington, DC.
National Research Council. 2002. Integrity in Scientific Research: Creating an
Environment That Promotes Responsible Conduct. National Academies Press,
Washington, DC.
Table 2.1 Research conduct recommendations
48
Category Expert Panel on Research Integrity, Singapore Statement
Council of Canadian Academies
Chapter 2
Conduct 1. Conduct research in an honest search for knowledge: a fair, 1. Integrity: Researchers should take responsibility for the
open, and reliable approach to all activities that support, trustworthiness of their research.
fund, or otherwise encourage research. (Honesty; Fairness;
Trust; Openness)
Competence 3. Know your level of competence and your limitations; act 3. Research Methods: Researchers should employ appropriate
accordingly: Ensure you have the appropriate expertise research methods, base conclusions on critical analysis of
and experience to participate in a given area of research the evidence and report findings and interpretations fully
or research administration. (Honesty; Trust; Accountability) and objectively.
Environment 2. Foster an environment of research integrity, accountability, 2. Adherence to Regulations: Researchers should be aware of
and public trust: Individuals and organizations at all levels and adhere to regulations and policies related to
should take responsibility for creating, implementing, research.
maintaining, and complying with policies and practices
13. Research Environments: Research institutions should create
designed to ensure accountability and the maintenance of
and sustain environments that encourage integrity
public trust. (Trust; Accountability)
through education, clear policies, and reasonable
standards for advancement, while fostering work
environments that support research integrity.
Conflicts 4. Avoid conflicts of interest, or if they cannot be avoided, 9. Conflict of Interest: Researchers should disclose financial
address them in an ethical manner: Personal and and other conflicts of interest that could compromise the
institutional conflicts of interest, or the appearance of trustworthiness of their work in research proposals,
conflict of interest, should be avoided. When unavoidable, publications and public communications as well as in all
each instance should be identified, disclosed, carefully review activities.
examined, and managed in such a way as to avoid any
corruption of the research process. (Trust; Accountability;
Openness)
Records 8. Treat data with scholarly rigor: The highest levels of 4. Research Records: Researchers should keep clear, accurate
exactitude should be ensured in proposing, performing, records of all research in ways that will allow verification
recording, analyzing, interpreting, reporting, publishing, and replication of their work by others.
and archiving research data and findings. The
appropriate authorities, as mandated by applicable
standards or regulations, should retain a copy of research
records. (Honesty; Accountability)
Reporting 7. Report on research in a responsible and timely fashion: 5. Research Findings: Researchers should share data and
Publications, including clear statements of data and findings openly and promptly, as soon as they have had
methodology, as well as research activities and research an opportunity to establish priority and ownership claims.
results, should not be unduly delayed or intentionally
6. Authorship: Researchers should take responsibility for their
withheld. These considerations should be configured
contributions to all publications, funding applications,
within each discipline’s own timeframe. (Trust; Openness)
reports and other representations of their research. Lists
10. Acknowledge all contributors and contributions in research: of authors should include all those and only those who
All contributors and contributions to research and meet applicable authorship criteria.
research results, including financial contributions, should
7. Publication Acknowledgement: Researchers should
be acknowledged fairly and accurately whenever
acknowledge in publications the names and roles of those
research is communicated. (Fairness; Accountability;
who made significant contributions to the research,
Openness)
including writers, funders, sponsors, and others, but do
Review 6. Review the work of others with integrity: Individuals and 8. Peer Review: Researchers should provide fair, prompt and
organizations should engage in, and organize, peer rigorous evaluations and respect confidentiality when
review and the evaluation of the work of others in a reviewing others’ work.
manner that reflects the highest scholarly, professional,
and scientific standards of fairness and confidentiality.
(Fairness; Trust)
(continued)
49
Table 2.1 (continued)
50
Category Expert Panel on Research Integrity, Singapore Statement
Council of Canadian Academies
Chapter 2
Trainees 11. Engage in the responsible training of researchers: Research
investigators, particularly new scholars, should have
access to education, mentoring, and support to develop
and maintain the skills and capacities required for
conducting and managing research in accordance with
relevant scholarly and ethical standards. An individual’s
level of responsibility should be commensurate with his
or her competence and experience. (Fairness; Trust)
Rest JR. 1986. Moral Development: Advances in Research and Theory. Praeger Pub-
lishers, New York, NY.
Shamoo AE, Resnik DB. 2009. Responsible Conduct of Research, 2nd ed. Oxford
University Press, New York, NY.
Steneck NH. 2007. ORI Introduction to the Responsible Conduct of Research. U.S.
Government Printing Office, Washington, DC. http://ori.hhs.gov/sites
/default/files/rcrintro.pdf.
Weston A. 2010. A Practical Companion to Ethics, 4th ed. Oxford University Press,
New York, NY.
Online
A collection of ethics codes published by professional and academic socie
ties and associations may be found at the following websites.
Center for the Study of Ethics in the Professions at the Illinois Institute of
Technology website:
http://ethics.iit.edu/
(Note: the Irish Council for Bioethics ceased to exist in 2010. The PDF referenced
here—archived on the Irish Patients Association website—may still be downloaded.)
Mentoring
Francis L. Macrina
Overview • Characteristics of the Mentor-Trainee Relationship
• Choosing a Mentor • Foundations of Mentoring • Diversity,
Research, and Research Training • Learning Mentoring Skills
• Conclusion • Discussion Questions • Case Studies • Resources
Overview
History
The word “mentor” has its origins in the poetic epic The Odyssey, written
by Homer more than 2,500 years ago. In Homer’s story, Odysseus, king of
Ithaca, sails off with his army to do battle in the Trojan War. Before leav-
ing, Odysseus entrusts the care and education of his son Telemachus to his
faithful friend Mentor. Mentor’s responsibilities become enormous in
scope and duration. The war lasts 10 years, and Odysseus’ return trip takes
another decade as he encounters one astounding adventure after another.
Meantime, Penelope, Odysseus’ wife, is being courted by noblemen in her
husband’s absence. Thinking that Odysseus will never return, these suitors
waste his possessions by staging numerous feasts and parties. Throughout
all of this, Mentor faithfully performs his oversight duties. His efforts are
manifested in the young man Telemachus, who ultimately demonstrates he
is worthy to be the son of Odysseus. And so the word “mentor” has come
to mean a loyal and trusted friend, enlightened advisor, and teacher.
Scientific Integrity: Text and Cases in Responsible Conduct of Research, 4th ed.
by Francis L. Macrina
© 2014 ASM Press, Washington, DC
doi:10.1128/9781555818487.ch3
53
54 Chapter 3
The canons of scientific integrity derive their life from effective men
toring in graduate and postdoctoral training programs. Mentors inform, in-
struct, and provide an example for their trainees. The actions and activities
of mentors affect the intellect and attitude of their trainees. The educational
transfer process may be obvious or subtle, but the effects are rarely in dis-
pute: trainees emerge from their programs with an intellectual and ethical
framework strongly shaped by their mentors. Indeed, trainees often assume
the traits and values of their mentors. Thus, mentors are the stewards of
scientific integrity. Yet the young faculty member who has just accepted his
or her first trainee into the lab is not likely to have had much formal educa-
tion in the principles of mentoring and is very likely to have no experience
at all. The direct experience of dealing with trainees improves mentoring
skills. To be sure, the skills and responsibilities of mentoring sometimes
elude precise articulation and definition, because, as a human activity, there
is great variation in the practice of mentoring trainees. There are many ef-
fective styles, and although common traits may be shared, there is no one
prescribed method.
Characteristics of the
Mentor-Trainee Relationship
A growing body of literature discusses and analyzes mentoring in profes-
sional settings, including the university and the research laboratory. In ad-
dition, many academic and research institutions now publish policies or
guidelines on mentoring, and these have been used to inform the following
discussion of mentor-trainee relationship characteristics. In the sciences
and related professions there are several general categories of activities
that describe the mentor-trainee relationship and the roles of its partici-
pants. These apply universally—to a greater or lesser extent—to mentor-
trainee or mentor-protégé relationships at any level.
Choosing a Mentor
Forming mentor- trainee relationships that involve an established re-
searcher and a predoctoral (or masters level) or postdoctoral trainee is a
two-way street. In general, the prospective trainee starts by narrowing the
selection process according to the field of work of possible mentors. On
the one hand, this part of the process is steeped in the trainee’s educational
and professional goals and objectives. These must be compatible with the
skills and expertise of a mentor. For predoctoral trainees the selection pool
includes faculty in their home departments, or in other departments in the
case of multidisciplinary training programs. For prospective postdoctoral
students, meeting professional goals and objectives is a critical driver in
seeking a mentor. But once they have decided on the nature of the schol-
arly training they are seeking, candidates may undertake a national or in-
ternational search for the desired person. Whether seeking a predoctoral
or postdoctoral mentor, trainees typically use both subjective and objective
criteria in the selection process. These include:
• Active publication record in high-quality, peer-reviewed journals.
Online tools for evaluating this include the Web of Science, PubMed
and PubMed Central, and Google Scholar. Individual and institu-
tional websites of mentor candidates under consideration are good
sources of such information, too.
• Extramural financial support base: competitiveness and continuity of
support. Publicly available databases of grants made by the National
Institutes of Health (NIH), the National Science Foundation (NSF),
and other federal funding agencies are helpful here. Many private
foundations also list grants awarded, including the name of the prin-
cipal investigator. Also useful in this category are curricula vitae or
biosketches that may be posted on the candidate mentor’s personal
websites.
• National recognition: meeting and seminar invitations, invited pre-
sentations, consultantships, and honors. As above, these may be
found in online biographical documents or in online departmental or
institutional reports.
Mentoring 61
Foundations of Mentoring
Institutional commitment
Effective mentoring is built on a foundation of institutional commitment.
As stressed in the Association of American Medical Colleges (AAMC) train-
ing compacts for predoctoral and postdoctoral trainees, institutions must be
committed to a training environment comprising the highest educational,
scientific, and ethical standards. Institutional commitment requires clear
policy, organizational structure, and oversight to foster a research mentor-
ing environment. Such institutional commitment ensures consistency and
openness that benefits both mentors and trainees. For predoctoral mentor-
ing, this involves sustaining high-quality academic programs, providing ex-
plicit guidance on trainee expectations, and promoting mechanisms for
monitoring trainee progress. To achieve this, graduate training programs
must be well developed and supported. That the institution puts a premium
on graduate education must be self-evident to trainees and mentors alike.
For postdocs, institutional commitment means providing a user-friendly en-
vironment that is designed to ensure that trainees finish their programs fully
prepared for the next step in their professional careers. The need for admin-
istrative infrastructure to support postdocs is being increasingly recognized,
and a growing number of institutions have created central offices that pro-
vide postdoctoral services and support training-related activities. Such of-
fices often are involved in creating and maintaining policies that govern
postdoctoral training and address such things as conditions and method of
appointment, salary levels, benefits, and grievance procedures. The National
Postdoctoral Association (NPA) has become a voice for postdocs, and it pro-
vides resources for helping institutions develop the administrative infra-
structure to enhance the training experience.
Institutional support can also play a role in the mentoring of under-
graduates and in peer-to-peer mentoring relationships. Institutional initia-
tives that coordinate and oversee research opportunities for undergraduates
provide a portal for undergraduates seeking to do research. Usually orga-
nized as institutional offices, these initiatives ensure matches between
mentors and students, creating an environment that encourages and nur-
tures undergraduate mentoring. Such initiatives often celebrate the men-
tored undergraduate experience by sponsoring special lectures, programs
featuring undergraduate research, and social events. All of these heighten
64 Chapter 3
Mentoring guidance
Guidance on mentoring in research training exists in various forms. Fre-
quently, institutional policies on academic standards or on responsible con-
duct of research include the topic of mentoring. Examples of such policy
statements may be found by searching institutional websites, and represen-
tative samples are found below in the “Resources” section. Some institutions
have prepared position papers or have published mentoring “handbooks.”
Institutions also may publish mentoring policies addressing predoctoral or
postdoctoral mentoring practices and expectations. N ational organizations
such as the Howard Hughes Medical Institute and the AAMC have pub-
lished monographs or position papers that address mentoring practices. The
following is a distillation of mentoring guidance from this genre of sources
to illustrate the spectrum of topics addressed. Categories of information are
not presented in any order of priority, nor is any relative importance implied
based on, for example, the number of times a particular item appears in
these documents. Instead, this summary is meant to fully describe the con-
tent of these documents so as to provide the broadest possible perspective.
Personal characteristics
Desirable characteristics of mentors include being
• A good listener
• Constructively critical, including providing regular evaluation of
performance
• Willing to share knowledge
• An exemplar of honesty and ethical standards
• Appreciative of trainee contributions
• Attentive to career development and career counseling, including in-
troducing trainees to scientific colleagues to catalyze networking
• Appreciative of diversity and inclusivity
• Respectful of matters involving trainee confidentiality
Trainees have responsibilities to their mentors that include
• Being proactive in planning and goal setting
• Conscientiously discharging their agreed-upon and assigned duties
in connection with their research projects
• Meeting regularly with their mentors to review data and to be
counseled
• Being respectful of their mentors and their mentors’ time
• Being thankful
• Maintaining research records according to best practices for their
disciplines
• Engaging their mentors in open and timely discussions of research
data, including review of data books and sharing data with others
• Taking appropriate responsibility for reporting research in the liter-
ature according to relevant policies and best practices
• Conducting research involving human or animal subjects or biohaz-
ards in full compliance with relevant regulations and policies
• Fully disclosing competing interests that might create a real or per-
ceived conflict of interest in relationship to the trainee’s research or
the research agenda of the mentor
Assignment of a mentor
For predoctoral trainees, institutional guidelines and policies frequently
describe this as a formal transaction that is vested in the graduate program
administration. It is neither a temporary nor ad hoc assignment, and disso-
lution of the relationship usually requires a second formal transaction in-
volving all the interested parties (trainee, extant mentor, new mentor, and
sometimes the relevant program organization or the institution). The for-
malization of mentorship involving a postdoctoral trainee is usually mani-
fest in the appointment letter signed by the postdoctoral mentor.
Mentor-trainee ratio
The ratio of mentor to trainees in a laboratory group should be small
enough to foster scientific interchange and to afford supervision of the
research activities throughout the training program. Few would argue
with the assertion that, at some point, the size of a laboratory research
group curtails and may even preclude responsible and effective mentor-
ing. However, defining that point is difficult, because it depends on such
factors as the type of trainee (entry level or advanced, predoctoral or
postdoctoral), the nature of the work being performed, the overall time
commitments of the mentor, and the mentor’s management skills. Some
would argue that active mentoring of more than 10 to 12 trainees is
challenging if not impossible. Larger groups must have a secondary
mentoring network in place, wherein senior members of the lab also
serve as mentors. Such an infrastructure may enable the laboratory head
to delegate mentoring duties, but this practice can be criticized on the
grounds that such systems are not in keeping with some mentoring
guidelines. Specifically, mentoring is predicated on mentor-trainee in-
terchange and, as such, does not afford the latitude for delegation of
such responsibility.
Communication
Collegial discussion among mentors and trainees should pervade the rela-
tionship, and this should be highlighted by regular group meetings that
contribute to the scientific efforts of the group and, at the same time, ex-
pose trainees to informal peer review. The definition of “regular” is usually
not provided in guidelines, although in at least one instance, once a month
was suggested. Group meetings should be augmented by mentor-trainee
meetings that are held regularly and privately. Individual attention pro-
vides the mentor and the trainee with a unique opportunity for uninhib-
ited communication, critical analysis, and problem solving on matters that
may be unique to the trainee or the specific project. Some guidelines noted
that a mentor needs to communicate a clear map of expectations leading to
a trainee’s academic goals.
The mentor is responsible for providing trainees with all relevant rules,
regulations, and guidelines that may apply to the conduct of research (e.g.,
responsible conduct of research, human and animal use documents, radio-
active and hazardous substance use documents, and others). The mentor
has a responsibility for oversight and enforcement in this area, too. Train-
ees must comply with rules and regulations as observed directly or moni-
tored indirectly by the mentor. The breach of any established policy will
come to rest with the mentor as the individual with overall responsibility
for the laboratory group.
In addition to the mentor’s role in ensuring that trainees are aware of
and understand relevant material, some guidelines mention that mentors
should be role models in conducting their research according to these pol-
icies, rules, and regulations.
Career counseling
Institutional guidelines occasionally contain recommendations about the
mentor’s role in promoting the careers of his or her trainees. These span
such things as writing candid letters of recommendation and assisting
trainees in job placement. Mentors should encourage trainees to view job
prospects realistically. Mentors should play a proactive role in facilitating
networking by introducing their trainees to colleagues, potential collabo-
rators, or individuals who might contribute to their professional develop-
ment (department chairs, senior administrators, etc.).
Performance evaluation
Planning and evaluation are vital to the career development of trainees. A
workable training plan should be accompanied by regular monitoring and
evaluation of progress. Plans should reflect expectations and objectives
that are explicit and realistic. In the case of predoctoral trainees, such plan-
ning and performance evaluation is embedded into the structure of the
68 Chapter 3
Finding yourself in the role of a mentor for the first time is likely to be a
little daunting. The relationship a new mentor establishes with his or her
first trainee is laden with responsibilities for both. For the first- time
72 Chapter 3
mentor, there is sobering reality in the thought that someone has entrusted
you with the oversight and guidance of a critical part of his or her career
development. And what training prepared you for being a mentor? Hope-
fully, you had good mentoring throughout your own training, and you
have learned by observing your mentors as role models. Experiencing be-
ing mentored from the trainee’s side of the relationship will provide bene-
fits in preparing you to be a mentor. You might have read up on the subject,
including book chapters like this one. Although these experiences can
jump-start your role, learning to be a good mentor takes time. Consider
the words of Jo Handelsman, Christine Pfund, Sarah Miller Lauffer, and
Christine Maidl Pribbenow:
Effective mentoring can be learned, but not taught. Good mentors discover
their own objectives, methods, and style by mentoring. And mentoring. And
mentoring some more. Most faculty learn to mentor by experimenting and
analyzing success and failure, and many say that the process of developing an
effective method of mentoring takes years. No two students are the same or
develop along the same trajectory, so mentoring must be continually cus-
tomized, adjusted, and redirected to meet each student’s needs. A skilled
mentor’s decisions and actions are guided by a reflective philosophy, a well-
developed style, and an ability to assess student needs. There is certainly no
book that can tell us how to deal with every student or situation, but a sys-
tematic approach to analyzing and discussing mentoring may lead us to a
method for tackling the knotty challenges inherent in the job.
Conclusion
Discussion Questions
Case Studies
3.1 Lois Adams is doing her doctoral research in psychology under the
supervision of her mentor, Professor Kali Chaterjee. Her research
is aimed at evaluating strategies that motivate patients over age 50 to get
colonoscopy screenings. Lois has spent the past year designing and validat-
ing a survey to assess behavioral and motivational factors that aim to im-
prove compliance with standards recommended for having this procedure.
Meanwhile, Neo-Med-Care, an ambitious biotechnology company, has
just marketed a noninvasive way to screen for colon cancer by improving
the sensitivity of a fecal blood test. Neo-Med-Care has been trying unsuc-
cessfully to convince patients to try its screening method. Lois has told her
uncle, who works for Neo-Med-Care, about her dissertation project, and
without consulting her mentor offers her uncle a copy of the survey. Sev-
eral months later Professor Chaterjee’s husband is given a printed survey
during his annual physical visit with his primary care physician. He is asked
74 Chapter 3
to take the survey home, complete it, and mail it back to the physician’s
office. Upon returning home, he shows the survey to his wife, who is struck
by the similarity of this questionnaire to the one developed by Lois. Some
of the survey items are identical or nearly identical to those developed by
Lois. And overall, the conceptual basis of the survey is similar to that of
Lois’s. Professor Chaterjee makes a photocopy of the survey and contem-
plates whether she should bring this to Lois’s attention. What should she
do? Given the facts of the case, has Lois done anything wrong? Has
Neo-Med-Care?
3.3 Sheila Wood and Professor Omar Deeb have met several times to
discuss possible projects that Sheila might take on as a doctoral
dissertation project. During the last discussion, Deeb recites a series of
rules that he applies uniformly to his graduate trainees. Most of the issues
Mentoring 75
favor implementing this plan. She comes to you for advice on what to do.
What do you tell her?
3.6 Dr. Montel Conrad has received a grant from an industrial source
to do basic research that has implications for commercialization. A
new graduate student, Michelle Lawless, has just joined his lab after
Mentoring 77
3.7 Dr. Rhonda Archer mentors several predoctoral trainees. One of her
students, Gordon Krol, shows Rhonda data that suggest a novel
property of an enzyme under study. Both Rhonda and Gordon believe this
work has major implications for expanding the knowledge about this en-
zyme. At Rhonda’s request, Gordon repeats the experiments successfully.
Then, because of the important implications of this work, Rhonda ap-
proaches a predoctoral student in the lab and asks her to perform the same
experiments to double-check the results. Rhonda instructs the student not
to discuss the experiments with anyone else in the lab in order to obtain in-
dependent data to confirm Gordon’s potentially important findings. When
the student’s work is done, all data will be disclosed to all parties. Are the
advisor’s actions justified? Why or why not? What other means could be
used to achieve Rhonda’s need to confirm reproducibility?
3.8 Jim Allen has been a postdoctoral fellow in your lab for 3 years.
He is in final negotiations for a tenure-track assistant professor-
ship at another university. He is excited about taking this job, and you are
pleased that the position will allow him an excellent opportunity to grow
into an independent scientist. At the request of Dr. Norbert Wiley, his
prospective departmental chair, Jim has been preparing an equipment list
needed to set up his laboratory. Jim has come to you for advice several
times while preparing this list. This morning he shows up in your office
78 Chapter 3
and you immediately sense he is upset. Last night Dr. Wiley called and
asked him to be sure to include several additional equipment items on his
list. Dr. Wiley told him: “Setting up faculty is our best opportunity to get
equipment money for the department from the dean and vice president’s
office. The department desperately needs a phase-contrast microscope,
an ultraspeed centrifuge, a high-end computer server, and two ultra-low-
temperature freezers. So please add these to your setup list. I promise
that asking for these items won’t compromise our ability to secure the
money for the equipment you actually need for your lab.” In Jim’s present
or planned research, he has no need for such equipment. Jim feels he is
being asked to falsely represent his needs to the university administra-
tion. He is worried that if he objects to or refuses Dr. Wiley’s request, he
may not be offered the job. He asks you for advice on how he should
proceed.
intoxicated, he has clearly been drinking. You have some passing concern
that Mike could be endangering himself and others by operating poten-
tially dangerous lab equipment following alcohol consumption. The next
day you visit the lab to change some cell culture media, and you discover
that Mike’s centrifuge has completed its run and is sitting idle with Mike’s
samples still in it. You phone his apartment but get no answer, so you send
him an e-mail alerting him to the problem. The next morning the centri-
fuge is still not in operation, but Mike’s tubes are no longer in the rotor.
Sensitized to these events, you take a keen interest in Mike’s behavior. You
notice that you can sometimes smell alcohol on his breath in the mornings
when he comes to the lab. Are you obliged to act on these observations?
What actions, if any, do you take? Should you choose to inform Mike’s
mentor, what would you expect her to do?
Resources
Print
Barker K. 2010. At the Helm: Leading Your Laboratory, 2nd ed. Cold Spring Harbor
Laboratory Press, Cold Spring Harbor, NY.
Blixen CE, Papp KK, Hull AL, Rudick RA, Bramstedt KA. 2007. Developing a
mentorship program for clinical researchers. J Contin Educ Health Prof 27:86–93.
Burroughs Wellcome Fund. 2008. Staffing the Lab: Perspectives from Both Sides of
the Bench. Burroughs Wellcome Fund, Research Triangle Park, NC. http://
www.bwfund.org/sites/default/files/media/files/staffing%20the%20lab.pdf.
Burroughs Wellcome Fund. 2009. Excellence Everywhere: A Resource for Scientists
Launching Research Careers in Emerging Science Centers. Burroughs Wellcome
Fund, Research Triangle Park, NC. http://www.excellenceeverywhere.org/
images/book/excellence_everywhere.pdf.
Burroughs Wellcome Fund. 2009. Moving On: Managing Career Transitions. Bur-
roughs Wellcome Fund, Research Triangle Park, NC. http://www.bwfund.org/
sites/default/files/media/files/Moving%20On.pdf.
Burroughs Wellcome Fund and Howard Hughes Medical Institute. 2006.
Making the Right Moves: A Practical Guide to Scientific Management for Postdocs and
New Faculty, 2nd ed, p 97–111. Burroughs Wellcome Fund, Research Triangle
Park, NC, and Howard Hughes Medical Institute, Chevy Chase, MD. http://
www.hhmi.org/sites/default/files/Educational%20Materials/Lab%20
Management/Making%20the%20Right%20Moves/moves2.pdf.
Burroughs Wellcome Fund and Howard Hughes Medical Institute. 2006.
Training Scientists To Make the Right Moves: A Practical Guide to Developing Pro-
grams in Scientific Management. Burroughs Wellcome Fund, Research Triangle
Park, NC, and Howard Hughes Medical Institute, Chevy Chase, MD. http://
www.hhmi.org/sites/default/files/Educational%20Materials/Lab%20
Management/Training%20Scientists/training-scientists-fulltext.pdf.
Cohen CM, Cohen SL. 2005. Lab Dynamics: Management Skills for Scientists. Cold
Spring Harbor Laboratory Press, Cold Spring Harbor, NY.
80 Chapter 3
Dee P. 2006. Building a Successful Career in Scientific Research: A Guide for PhD Stu-
dents and Postdocs. Cambridge University Press, Cambridge, United Kingdom.
Handelsman J, Pfund C, Lauffer SM, Pribbenow CM. 2005. Entering Mentor-
ing: A Seminar To Train a New Generation of Scientists. University of Wisconsin
System, Madison, WI. http://www.hhmi.org/sites/default/files/Educational%20
Materials/Lab%20Management/entering_mentoring.pdf.
International Union of Biochemistry, Committee on Education. 1989. Stan-
dards for the Ph.D. degree in biochemistry and molecular biology. Trends
Biochem Sci 14:205–209.
Lee A, Dennis C, Campbell P. 2007. Nature’s guide for mentors. Nature 447:791–
797.
McCook A. 2011. Mentoring: on the right path. Nature 474:667–669.
National Academy of Sciences. 1997. Adviser, Teacher, Role Model, Friend: On Being
a Mentor to Students in Science and Engineering. National Academy Press, Wash-
ington, DC. http://www.nap.edu/openbook.php?record_id=5789.
Revillard JP, Celada F. 1992. Guidelines for the Ph.D. degree in immunology.
Immunol Today 13:367–373.
Online
Following are examples of guidance material that deals with mentoring
issues.
Mentoring Undergraduates:
http://oregonstate.edu/students/research/mentoring-undergraduates
(Note: also use the NSF site search engine to access “postdoctoral researcher
mentoring plan.”)
Scientific Integrity: Text and Cases in Responsible Conduct of Research, 4th ed.
by Francis L. Macrina
© 2014 ASM Press, Washington, DC
doi:10.1128/9781555818487.ch4
83
84 Chapter 4
In the 6th edition, Day and his coauthor, Barbara Gastel, posit that re-
search as a profession is unique in that it requires that scientists write about
what they do. Doing scientific research means you must report it. In com-
menting on scientific publication, Donald Kennedy says: “All the thinking,
all the textual analysis, all the experiments, and the data gathering aren’t
anything until we write them up. In the world of scholarship we are what
we write.” It follows that we are either recognized or ignored by the per-
ceived importance and the impact of our scholarly writing.
called open access (OA) and comprises journals that are exclusively digi-
tal, with no printed counterparts. Access to them is free to the end user.
Instead of the cost of publication being paid by subscription fees, the
authors bear the cost of publication. A third form of published research
literature is the electronic repository. Here, papers that have been previ-
ously peer reviewed and published are available for free, electronic access.
Well-known repositories include PubMed Central and related coopera-
tive initiatives, e.g., Europe PubMed Central and PubMed Central
Canada. Operated by the National Center for Biotechnology Informa-
tion, PubMed Central contains papers that report research that has been
supported by grants from the National Institutes of Health (NIH).
Additional discussion on digital publication appears later in this
chapter.
increasingly evident in the past few decades. For example, the number of
publications on the subject of authorship of scientific papers has jumped
from a handful in the 1970s to thousands in the present day. Interrogation
of the PubMed database using search terms like “authorship guidelines,”
“authorship criteria,” “ghost authorship,” and “honorary authorship” cur-
rently reveals a plethora of scholarly writing on the subject. A sampling of
topic areas includes authorship responsibilities, ethical publication guide-
lines, management of errors in the literature, the prevalence of ghost and
honorary authorship, and the impact of disclosure of competing interests
on research reporting. Institutions and professional societies have imple-
mented guidelines dealing with authorship and publication. And profes-
sional organizations and scholarly societies continue to study and make
recommendations about authorship and publication practices.
Publication policies and guidance have grown in scope and number
over the past few decades. They continue to evolve, and they merit the at-
tention of novice and seasoned scientist-authors. The following two sec-
tions of this chapter will provide an overview of authorship best practices
derived from a variety of such sources.
Authorship criteria
Increasingly, journals provide guidance on the definition of authorship and
its responsibilities. The words frequently come down to the same two is-
sues. First, an author has to make a significant contribution to the work.
Most statements like this leave plenty of room for interpretation and thus
are flexible. Second, statements defining authorship may mention that all
authors on a manuscript take responsibility for its content, or have read
and approved the manuscript, or consent to its submission.
Some journals now require that the contributions of all coauthors be
described in the paper, with this information usually published as a foot-
note. Such contributorship models may list author-associated activities like
formulating hypotheses, experimental design, writing and critical editing,
data collection and processing, analysis and interpretation, and literature
review and citation. Additionally, the identification of the author or au-
thors who take responsibility for the integrity of the work as a whole is
sometimes encouraged (so-called guarantors of the work). The expectation
is that these models reduce the ambiguity about the contributions of au-
thors. This is arguable on the grounds that such disclosure does not allow
assessment of the quality and quantity of contribution and is compounded
by the usual brevity of description (e.g., “data acquisition”), which may add
rather than remove ambiguity. On balance, however, the contributorship
model is useful and meritorious because it demands that investigators who
have a stake in the research be proactive in developing and defending the
basis for their authorship.
Copyright
Copyright is a form of intellectual property that is defined by law in the
United States and many other countries. In terms of a scientific manu-
script, copyright means that an author or authors hold the right to dupli-
cate (copy), distribute, display, or prepare a derivative version of the work.
Copyright protects the expression of the creative work—the exact form of
Authorship and Peer Review 89
text, figures, tables, etc.—but it does not protect the ideas or information
conveyed in the manuscript. This is further discussed below and in chapter
9. Historically, a condition of manuscript acceptance for most scientific
journals is that the authors assign the copyright to the publisher. Increas-
ingly, print and online scientific journals are moving from this requirement
by allowing the author(s) to hold copyright of the work while at the same
time granting the publisher an exclusive license to publish the work. This
facilitates the submission of published papers to repositories like PubMed
and the ready posting of authors’ published work to institutional and per-
sonal websites. OA publications use a variety of copyright models but often
allow the authors to retain copyright while abiding by some type of an OA
license that permits users to download, print, and use the content with ap-
propriate attribution to the authors and the publisher. Whatever the copy-
right model, there is a required transaction in which the author(s) and the
publisher form the legal agreement of copyright ownership and use. Fi-
nally, many journals require the authors to obtain permission to use any
copyrighted material that is included in their manuscript, e.g., a diagram
from a previously published paper. This is usually a formality that involves
writing to the publisher who holds the copyright for the work to be in-
cluded and describing its intended use. Many publishers have forms or on-
line interactive sites that can be used in lieu of a letter. Of course, if the
author holds the copyright under any of the models described above, this
process is simplified.
Manuscript review
Matters relating to the peer review of the manuscript often are found in
the “Instructions for Authors” section. Some journals allow authors to sug-
gest the names of impartial reviewers, either ad hoc referees or members of
the editorial board. This helps the editors do their job, and it is wise to take
advantage of the opportunity. Who qualifies as an impartial reviewer?
Opinions vary, and criteria are subjective. Often excluded as impartial re-
viewers are (i) people at the author’s institution, (ii) people who have been
recently associated with the author’s laboratory, and (iii) the author’s col-
laborators or coauthors. Individuals in the latter two categories are consid-
ered in view of the time that has elapsed since the author’s last interactions
with them.
Often a description of the peer review process is found in the instruc-
tions for authors. The process also may be described in a transmission
(usually electronic) acknowledging receipt of the manuscript. Authors
need to read about this process and know how it works. It can vary signifi-
cantly for different journals. Understanding the process helps authors in
dealing with the manuscript during peer review. The typical path of a man-
uscript through the review process is discussed later in this chapter.
90 Chapter 4
Although today we’d add PubMed to the list of indexing services, the defi-
nition is relevant almost 50 years after it was first written. Precisely defin-
ing a primary scientific publication is important to the concept of prior
publication.
In light of this definition, agreeing on what qualifies as prior publication
is arguable. There is ambiguity when considering, for example, papers
published in monographs (invited short papers or meeting proceedings). It
is not easy to determine how “readily available” a source may be. How
many copies of a monograph have to be sold or distributed to qualify it as
available? If all copies of the monograph have been distributed in the
United States, is it acceptable to submit essentially the same work to a
journal published in Europe? Some argue that original work published in
conference reports, symposium or meeting proceedings, or equivalent
monographs is by definition preliminary owing to considerations of for-
mat and space. Often methods cannot be fully described, and such work is
usually not subjected to peer review. However, if you are faced with a di-
lemma that impinges on the issue of prior publication, it is advisable to
have a conversation with the editor of the journal to which you intend to
submit your manuscript. Explaining the nature of the dilemma will
Authorship and Peer Review 91
provide disclosure to the editor or editorial staff that will yield an answer
on how your particular situation should be handled.
Scientists generally agree that it is wrong to publish the same material
as a primary publication in two different peer-reviewed journals. Using
that philosophy as a guide is highly recommended. The Policy on Prior
Publication of the Proceedings of the National Academy of Sciences of the United
States of America (PNAS) provides additional clarity on the matter.
PNAS considers results to have already been published if they have appeared
in sufficient detail to allow replication, are publicly accessible with a fixed
content, and have been validated by review. A paper has surely been pub-
lished if it has appeared in a journal cited by any widely used abstracting
service, whether in print or online, in English or in any other language. Gray
areas result when two of the three criteria (replicability, public accessibility,
and review) are met or only a portion of an article has appeared before. What
if only one figure has been published previously? That need not doom sub-
sequent publication in PNAS, but the authors must convince us at the time
of submission that the figure is essential for the submitted paper yet not the
major contribution.
Although their use was once limited to medical journals, embargo po-
lices that control the release and the public presentation of in-press papers
are now common in the scientific publishing world. Embargos prohibit the
public release of information about a paper prior to a specific date. Typi-
cally they also include a date only after which the news media may report
on the content of the paper. For example, an embargo may dictate that an
in-press manuscript may be released to the news media no more than a
week before the publication date and that news reports of the work not
appear or be broadcast sooner than 24 hours before the publication date of
the journal. An often-stated rationale in the medical publishing world is
that this affords health care providers and their patients with concurrent
access to the research findings. This enables the health care providers a
window of time to assimilate the findings and be better prepared to answer
patients’ questions. Outside of this medical implication, general rationales
for embargos include that they provide fair and equal access of scientific
papers to the media and allow time for the media to develop well-informed
commentary on the research.
allowing that work to be cited in another paper before she knows that hers
is accepted. By formally asking her permission, you eliminate any prospect
of misunderstanding.
In the case of the author’s unpublished work—“in-press” or “submitted”
manuscripts—journals may require that copies of such manuscripts ac-
company the new submission so that they can be used if needed during
peer review.
Conflict of interest
The disclosure of personal interests, activities, and associations has be-
come a common required practice in the publication of scientific papers.
Journal policies focus on the disclosure of any association with the poten-
tial to create a financial conflict of interest that might have an impact on
Authorship and Peer Review 93
Biosecurity
Prompted by the 2001 bioterrorism attacks in the United States, the U.S.
National Academy of Sciences and the U.S. Center for Strategic Interna-
tional Studies sponsored a 2003 meeting of editors, scientists, and security
experts to discuss scientific publication and national security. From this
meeting came a position paper authored by a group of editors and authors
that concluded that certain scientific information should not be published
because of its risk of use by terrorists.
The position paper was simultaneously published in Nature, Science,
PNAS, and the journals of the American Society for Microbiology. It con-
tained four concepts: (i) the integrity of the scientific process must be pro-
tected by publishing high-quality manuscripts written in sufficient detail
to ensure reproducibility; (ii) there should be a commitment to deal re-
sponsibly and effectively with safety and security issues that may be raised
by papers submitted for publication, and to increasing capacity to identify
such issues as they arise; (iii) there is need for consideration and imple-
mentation of the appropriate level and design of processes to accomplish
effective review of papers that raise such security issues; and (iv) the recog-
nition that, on occasion, an editor may conclude that the potential harm of
publication outweighs the potential societal benefits. Under such circum-
stances, the paper should be modified or not be published. In keeping with
these concepts, the statement declared that journals and scientific societies
can play an important role in encouraging investigators to communicate
results of research in ways that maximize public benefits and minimize
risks of misuse.
Since that time, a limited number of editorial boards and publishers
have included language in their instructions for authors or editorial poli-
cies that addresses the issue of biosecurity in the peer review process. Such
issues are typically broached under the rubric of “dual-use research of
96 Chapter 4
Miscellanies
Some journals also include policies on the handling of disputes once pa-
pers are published. Occasionally, journals are explicit about the option of
having their editors examine original data in the process of dispute resolu-
tion. In addition, many journals describe policies for publishing correc-
tions of author errors (corrigenda), errors made by the journal (errata), or
retractions of papers owing to invalid results. Publishers of a number of
journals have also begun using text-similarity software programs to detect
plagiarism. As part of journal policy, selected submissions may be screened
against a large database of published papers. Plagiarized material found in
a submitted manuscript requires correction. More preemptive action may
Authorship and Peer Review 97
Authorship: Definitions,
Duties, and Responsibilities
Defining authorship
Criteria for authorship have been presented variously in journal policies, in-
stitutional guidelines, and professional society statements. Commonly in-
voked is the need for an author to have made a significant contribution to the
98 Chapter 4
work. Such contributions are frequently described as those that have an ef-
fect on the “direction, scope, or depth” of the research. They have also been
stated in terms of “conceptualization, design, execution, and/or interpreta-
tion” of the research. The development of necessary methodologies and data
analysis essential to the conclusions of the project are also sometimes listed
as contributions that justify authorship. Sometimes the language is specific,
and contributions to the project are linked to having a “clear understanding
of its goals.” This leads to the issue of responsibility. Some have addressed
this issue in defining authorship by invoking the need “to take responsibility
for the defense of the study should the need arise” or “to present and defend
the work in context at a scientific meeting.” The challenge of coauthor re-
sponsibility where disparate contributions have been made was addressed in
one case by saying that exceptions to this rule will need to be made when
“one author has carried out a unique, sophisticated study or analysis.” In
other words, in certain collaborative studies, it may not be possible for every
author to be able to rigorously present and defend all aspects of the work.
To illustrate the specificity and detail of authorship definitions, let’s use
two examples. First, let’s examine the widely used definition of the ICMJE.
This definition is found in the ICMJE’s Recommendations for the Con-
duct, Reporting, Editing, and Publication of Scholarly Work in Medical
Journals, which were first published in 1979. Several updated versions of
the Recommendations have appeared since that time. At present these
Recommendations are used, in whole or in part, by more than 1,000 med-
ical and biomedical journals.
The current ICMJE definition (August 2013) for authorship found in
the Recommendations has, at its core, the following elements.
The ICMJE recommends that authorship be based on the following 4
criteria:
1. Substantial contributions to the conception or design of the work; or
the acquisition, analysis, or interpretation of data for the work; AND
2. Drafting the work or revising it critically for important intellectual
content; AND
3. Final approval of the version to be published; AND
4. Agreement to be accountable for all aspects of the work in ensuring
that questions related to the accuracy or integrity of any part of the
work are appropriately investigated and resolved.
Now, let’s look at the current definition found in the information for
authors for PNAS.
Authorship must be limited to those who have contributed substantially to
the work. The corresponding author must have obtained permission from all
authors for the submission of each version of the paper and for any change in
authorship.
All collaborators share some degree of responsibility for any paper they
coauthor. Some coauthors have responsibility for the entire paper as an
accurate, verifiable report of the research. These include coauthors who are
accountable for the integrity of the data reported in the paper, carry out the
analysis, write the manuscript, present major findings at conferences, or
provide scientific leadership to junior colleagues. Coauthors who make
specific, limited contributions to a paper are responsible for their contribu-
tions but may have only limited responsibility for other results. While not
all coauthors may be familiar with all aspects of the research presented in
their paper, all collaborators should have in place an appropriate process
for reviewing the accuracy of the reported results. Authors must indicate
their specific contributions to the published work. This information will be
published as a footnote to the paper. Examples of designations include:
• Designed research
• Performed research
• Contributed new reagents or analytic tools
• Analyzed data
• Wrote the paper
An author may list more than one contribution, and more than one author
may have contributed to the same aspect of the work.
Both the ICMJE and PNAS authorship definitions include many of the
same elements. The ICMJE definition is specific in its conditions and how
they are to be applied. The PNAS definition mentions the requirement for
a substantial contribution and then ties this to examples later in its narra-
tive. The PNAS definition is more explicit in detailing authorship respon-
sibility and accountability when multiple authors are involved. Both
definitions acknowledge that some coauthors may make specific contribu-
tions to the work and are responsible for them. The PNAS definition is
explicit in affirming that some coauthors have responsibility for the entire
paper (the guarantorship model), while the ICMJE definition embraces
the use of the guarantorship model in language preceding the definition in
the Recommendations. Aspects unique to the ICMJE definition involve an
accommodation of multicenter-based, group-authored papers (often clini-
cal trials fit this description). Both definitions address author accountabil-
ity, equating this to the responsibility for authors in the byline to present
the reported research finding in a public setting.
In summary, the ICMJE and PNAS authorship definitions provide a
foundation for appreciating the evolving field of policies and practices
Authorship and Peer Review 101
Classifying authors
Although there is not a universally accepted authorship nomenclature, ad-
jectives are commonly used to describe authors or types of authorships.
Instructions for authors and general guidelines and policies may refer to
these, thus providing context. Here is a synopsis of some of the more com-
monly used authorship terminology.
The senior author. Guidelines often define this person as the principal
investigator, leader of the group, or laboratory director. If the byline of a
paper lists a faculty mentor along with two of her predoctoral trainees and
one postdoctoral trainee, then the mentor is the senior author. The senior
author may be the first author listed in the byline. Most agree that the first
author is defined as having played a major role in generating the data, in-
terpreting the results, and writing the first draft of the manuscript. In many
cases, however, the first author and the senior author are different. When
this is so, it is customary in many disciplines for the senior author’s name
to be last in the byline.
Guidelines often vest senior authors with overarching responsibilities.
What follows is an amalgamation of the typical responsibilities listed in
several documents from universities, research institutions, professional so-
cieties, and publishers.
• The senior author, along with the first author, typically decides who
else will be listed as coauthors. General criteria for making these de-
cisions are discussed below. The senior author is responsible for no-
tifying all coauthors of this decision and for facilitating discussion
and decision making about the order of appearance of the coauthors’
names in the byline.
• The senior author, usually with the help of the first author and some-
times other coauthors, decides on the people to be listed in the “Ac-
knowledgments” section of the paper. The senior author should
notify the individuals to be acknowledged. The senior author also is
responsible for listing in the acknowledgments all sources of
102 Chapter 4
financial support for the work. In short, the senior author is respon-
sible for appropriately acknowledging all contributions to the work
reported in the paper.
• Senior authors often are the guarantors of the work, as defined pre-
viously in the guarantorship model. This means they review all data
contained in the paper and, in doing so, assume responsibility for the
validity of the entire body of work. This assertion may present prob-
lems in regard to specialized work that may be outside the senior
author’s area of expertise. In such cases, one means of handling this is
for the senior author to gain a reasonable understanding and verifi-
cation of the data from the appropriate coauthor. Still, this problem
persists as interdisciplinary research abounds and researchers from
highly technical and specialized fields collaborate and copublish
their results. Nonetheless, some of the guidelines in effect today are
very specific on this point: the senior author must “understand the
general principles of all work included in the paper.”
• The senior author has a responsibility to facilitate communication
among coauthors during the preparation of the manuscript. This
means reviewing raw data and discussing new ideas for additional
work. It certainly means reaching agreement on the part of all coau-
thors as to interpretation of results and conclusions.
• The senior author makes sure that the logistics of manuscript sub-
mission are properly followed. This may be something the senior
author does directly or assigns to another author (see the sections on
the first author and submitting author, below). Such things as manu-
script format and related material and local editorial review (if re-
quired) are included here. Also included are all dealings with the
publisher, e.g., correspondence, execution of copyright assignments
and authorship agreement forms, and, where appropriate, financial
matters such as publication charges.
• The senior author usually coordinates and oversees the responses to
the peer reviewers’ comments if the manuscript has to be revised.
This may a task done collaboratively with or assigned to the first
author, if they are not one and the same. He or she is responsible for
involving the coauthors in this process as appropriate and for seeking
the approval of all coauthors to submit the revised manuscript.
• The senior author is responsible for acting on and honoring requests
to share materials from the research once the paper is published.
Again, these may be assigned by the senior author to another person
in the author byline. Some publication guidelines recommend that
the person or persons to contact for materials reported in the paper
be listed explicitly, usually in the “Materials and Methods” section of
the paper. The senior author is responsible for coordinating and
Authorship and Peer Review 103
The first author. The first author is the author whose name appears first
in the byline of the paper. As mentioned above, the first author is the per-
son who participated significantly in the work by (i) doing experiments and
collecting the data, (ii) interpreting the results, and (iii) writing the first
draft of the manuscript. Some journals allow the first authorship position
to be shared. In other words, if the contributions of two authors (or more
in some journals) are equal or indistinguishable, then it is possible to iden-
tify each in the byline (e.g., with an asterisk) with a notation to that effect.
Because there still is a linear order of names in the byline, the order of the
equal contributors is left to authors’ mutual decision. James Watson and
Francis Crick reportedly used a coin toss to determine author order in
their 1953 classic paper proposing the double-helical structure for DNA.
Footnotes in contemporary papers reveal that the coin toss methodology
has been used in reconciling shared first authorship.
Other coauthors. Coauthors whose names appear between the first and
last author in the byline of a paper are usually determined by the senior
author and the first author. The order of these coauthors can be based on
the importance of their contributions to the work in descending order
from the first author. Decisions on authorship need to be made before the
104 Chapter 4
Inappropriate authorship
Certain types of unethical authorship are identified by specific terms that
graphically depict the behavior involved. The two most commonly used
designations are ghost authorship and guest authorship. Ghost authors,
although meeting qualifications for authorship, are those whose names
have been deliberately omitted from the byline of the paper. A guest au-
thor, on the other hand, is one who does not qualify for authorship but
whose name appears in the byline. Both ghost and guest authorships are
inappropriate.
Ghost authorship falls into two distinct categories. The first involves
someone who has legitimately participated in some aspect of the research
but whose name is omitted from the byline and the acknowledgments for
various reasons, e.g., their employment by a corporate entity. More com-
monly, ghost authors are actually ghostwriters, who analyze data, compose
data presentations, and write the manuscript. This may be done on a fee-
for-service basis, and a corporate sponsor may even finance this arrange-
ment. Why is ghostwriting wrong? Ghostwriters are removed from the
accountability that is attached to authorship. Moreover, transparency is
further eroded by the inability to critically evaluate possible conflicts and
bias that may be associated with the ghostwriter.
A second meaning of the term “ghost authorship” involves authors who
participated in the research as collaborators in a way that meets authorship
criteria. However, when the paper is published, their names do not appear
in the author byline. This may be the result of deliberate inappropriate
denial on the part of the other authors or confusion, misunderstanding, or
lack of communication between the collaborators. Although this use of the
term “ghost authorship” has a different meaning from the first category
described above, it is also wrong because it denies authorship to someone
who qualifies for and deserves a place in the byline of the paper.
Guest authorship is grounded in the expectation that inclusion of a par-
ticular name in the author byline will enhance the paper’s chances for fa-
vorable peer review and, ultimately, for being published. The guest author’s
status and visibility are expected to elevate the quality of the paper. But
guest authors do not contribute to the paper in ways that justify author-
ship; thus their name in the byline is inappropriate. A nuanced form of
guest authorship is called honorary or gift authorship. In this case, instead
Authorship and Peer Review 105
of the author’s name being able to enhance the status of the paper, the
honorary or gift author is afforded a place in the byline by virtue of his or
her position, e.g., a departmental chair or institute director. In fact, this is
an inappropriate courtesy that gives the honorary authors credit where
none is due.
Acknowledgments
The “Acknowledgments” section of a scientific paper is typically described
in guidelines as being reserved for those people whose contributions to the
work do not meet the criteria established for authorship. This might in-
clude someone who provided needed technical help but did not have a full
appreciation of the experimental work. Or it might be someone who pro-
vided writing or editorial assistance but participated in no other aspect of
the work. The ICMJE takes this a step further and recommends the “Ac-
knowledgments” section as the place to include individuals who have con-
tributed “materially” to the work but whose contributions do not justify
authorship, e.g., “scientific advisors” or “clinical investigators.” The ICMJE
recommends that written permission be obtained from anyone mentioned
in this section, as readers are likely to infer their endorsement of the data
and conclusions by virtue of their acknowledgment.
Peer Review
comments. The parts of the review forms that indicate the reviewers’ rec-
ommendation (“accept,” “reject,” or “revise”) as well as any comments ex-
clusively made to the editor are not sent to the authors. Editors may use
comments sent to them separately by reviewers to help in composing their
decision letter.
For most scientific journals in the biomedical and natural sciences, the
comments of the reviewers are anonymous. However, some journals do
reveal the identity of reviewers to the authors. This can be done as a matter
of policy or by encouraging reviewers to sign their written reviews.
Authors consider the reviewers’ and editor’s comments in revising their
papers. They may make changes based on comments they agree with. Al-
ternatively, authors have the right to rebut any and all criticisms of the re-
viewers. The basis for handling each of the reviewers’ comments must be
explained to the editor in a letter that accompanies the revised manuscript.
It is then the editor’s job to reach a final decision on the paper and to notify
the authors.
(see chapter 7). Can a scientist who believes it is inappropriate to use cells
derived from human fetal tissues in research objectively review a paper
that reports the results of human embryonic stem cell experimentation?
The reviewer has to decide whether there is conflict or whether others
might perceive specific actions as conflict. A simple rule is “When in doubt,
don’t review the paper.” The reviewer may contact the editor to seek ad-
vice on matters of potential conflict. In general, any extensive rationaliza-
tion for overcoming what might be a perceived conflict is usually a signal
to both the reviewer and the editor that a real conflict may exist or may be
perceived by others. In such cases, reassignment of the manuscript to an-
other reviewer is necessary.
If a reviewer returns a manuscript for reassignment, it is a courtesy to
tell the editor the reason for doing so. It is also customary to suggest the
names of potential substitute reviewers. Such help is valuable, and editors
appreciate it.
Some of the guidance commonly found in peer reviewer guidelines
follows.
Philosophy of review
The peer reviewer’s job has two aims: (i) to help the editor make a good
decision on the acceptability of the paper and (ii) to help the authors com-
municate their work accurately and effectively. The peer reviewer does not
have to be an adversary to do either of these jobs. Especially in the latter
case, the reviewer should be an advocate for the authors. Indeed, guide-
lines sometimes urge reviewers to take a positive attitude toward the man-
uscript. Frequently, peer reviewer guidelines caution against the use of
derogatory or libelous comments and ad hominem remarks. Reviews that
are confrontational are distressing to authors and often make things diffi-
cult for all involved. Meaning sometimes gets lost in impolite and ill-
considered language, and this can make the editor’s job of evaluating the
reviewer’s comments confusing. It can distract and mislead authors as they
prepare their rebuttals. Authors may “miss the point” and in doing so fail
to improve their manuscript. Additionally, time is often wasted when au-
thors feel the need to respond in kind to offensive language in their rebut-
tal letters to editors.
Confidentiality
A manuscript sent to a reviewer is a privileged communication. It is confi-
dential information and should not be shared with colleagues except under
prescribed conditions. For example, if it is necessary for the reviewer to get
assistance from colleagues in performing the review, guidelines usually al-
low this only if permission from the editor is sought and received. Such
guidance is often explicitly stated in peer review policies provided by
Authorship and Peer Review 109
journal publishers. Generally, the same holds true with regard to sharing
manuscripts with trainees. The opportunity to have a predoctoral or post-
doctoral trainee critically evaluate an unpublished manuscript may provide
a valuable learning experience. However, permission to allow a trainee to
do this should always be sought and received from the journal editor. Peer
review instructions published by some journals specifically address this, ac-
knowledging the value of the experience for the trainee but cautioning that
assigned reviewers should not share manuscripts with trainees without ed-
itorial permission. At least one scholarly organization, the Society for
Neuroscience, makes an exception for trainees, stating in its Guidelines for
Responsible Conduct Regarding Scientific Communication that
A reviewer may bring an immediate lab member with appropriate expertise
into the process for training purposes. In such situations, the reviewer is re-
sponsible for ensuring that the trainee fulfills all obligations for confidential-
ity, and the reviewer must report to the journal the identity of the trainee.
The reviewer remains fully responsible for the content and quality of the
review.
that other investigators can repeat the work. It is acceptable for some
methods to be mentioned briefly and then cited in the references. How-
ever, such citations should be the correct ones. Papers should not be used
as methods citations if they contain incomplete descriptions or if they refer
to an intermediary paper for the details of the method.
The reviewer should examine the presentation of data for clarity and
effectiveness, keeping in mind several questions. Is data presentation clut-
tered or confusing? Are figures and photographs unclear? What about the
organization of the data seen in tables and figures? Are there too many ta-
bles or figures? Can some be deleted? Would data given in tabular form be
better presented in figures? Should data in tables be combined or single-
panel figures redone as multipanel ones?
Interpretations of the data need to be sound and clearly worded. The
discussion of the work should be appropriate: arguments should be logi-
cally presented, and any speculation should be built on data in the paper or
the existing literature.
The writing in the manuscript should be clear, easy to follow, and gram-
matically correct. Many guidelines affirm that the peer reviewer’s job is not
to rewrite the manuscript. However, citing examples of writing deficien-
cies will help the authors in making global revisions. The reviewer should
also note whether the authors are adhering to correct scientific nomencla-
ture and abbreviations as specified by the journal.
The reviewer should evaluate the title and abstract after reading the
paper. Are they adequate and appropriate? With the widespread adoption
of electronic publication, the abstract has become the first line of scientific
communication. Thus, the abstract needs to clearly describe the essence of
the problem, how it was approached, and the outcome of the research.
advance of the competing paper. Thus, the need for expert review to assure
the quality of published research findings is sometimes pitted against the
conflicts that may compromise its integrity. In this particular case, the re-
viewer is best advised not to accept the assignment to review the
manuscript.
Finally, let’s consider whether peer review is able to detect fraudulent
data, i.e., fabrication and falsification. This question is subject to ongoing
discussion in both scientific and public communities. Journal commentar-
ies and opinion pieces written by scientists and publishers focus on the
“limits of peer review” and whether “peer review can police fraud.” The
upshot of the discussion by scientists and publishers is that the process of
peer review generally is not designed to detect fabricated and falsified re-
sults. Certainly, as discussed above, the use of text-similarity detection
software can detect plagiarism, and the use of such programs is emerging
in the peer review process. The same argument can be made for the in-
creasingly used forensic methods for detecting inappropriately manipu-
lated digital images. These methods are capable of preemptively detecting
doctored images. However, it should be noted that even with this process
in place at one journal, a high-profile case emanated from the report of a
whistle-blower and not as the result of electronic monitoring of a photo-
graph for manipulation that resulted in deception.
The focus of the public media is more subjective and typically embraces
the expectation that peer review is able to detect fraud. For example, news-
print articles on publications that contain fabricated and falsified data have
invoked the “failure of the vaunted peer review” system as a contributing
cause in the publication of fraudulent results. Similarly, statements in arti-
cles on research misconduct claim that the peer review system in science is
designed to “root out” research fraud. Both of these assertions are
misguided.
So what are the realistic expectations of the peer review process when it
comes to papers that contain fabricated or falsified data? Media writers do
not offer the details of why the peer review process should be able to de-
tect bogus data in the first place. Instead, peer review of scientific publica-
tion is usually blamed in whole or in part when fraudulent published data
are uncovered. The reasons for the “failure” are not totally developed but
often include accusations of failure to uphold review standards or shortcuts
taken to publish high-impact research papers. The arguments from the
publishing and scientific communities are drawn from the day-to-day in-
volvement in the process and observations of its operation. Generally,
these arguments hold that detecting fabricated or falsified data that have
been created to deliberately deceive the peer reviewer and, ultimately, the
reader is practically impossible. Usually, perpetrators of fraudulent data
are careful enough in their fabrications and falsifications to generate data
Authorship and Peer Review 113
sets that don’t raise suspicions or seem “too good to be true.” So recogni-
tion of such data as fraudulent at face value is not possible. Moreover, edi-
tors and peer reviewers typically do not receive original data outputs,
records, and related materials as part of the review process. This makes
detection of deliberately crafted fraudulent research data even less likely
during the review process.
In general, peer reviewers assume that research findings in manuscripts
are reported honestly and without intention to deceive the reader. The
whole process is built around trust in the authors’ conduct and reporting
of the research. The process expects that peer reviewers will judge the ap-
propriateness of methods selected to address the problem, the nature and
appropriateness of the data analysis, the plausibility of the interpretation of
the data, and whether the conclusions of the paper are consistent with the
data analysis and interpretation. In the absence of whistle-blowing or of
electronic detection of plagiarized material or manipulated digital images,
it is reasonable to posit that the best tool for detecting fraudulent research
results is what many call the “self-correcting” nature of science. Namely,
over time results that have been fabricated or falsified will not withstand
the scrutiny of additional research designed to repeat or build on them.
electing to pay the fee have their publications placed in the public domain
immediately.
A second model for publishing research papers, Open Access (OA), also
began in the 1990s. In this model, papers are published electronically with-
out a corresponding print version. Instead of a subscription fee paid by
readers, the publication costs in the OA model are borne totally by the
author. Thus, OA publication is often referred to as an “author pays”
model. Peter Suber has written extensively about OA publication and de-
fines it simply: “open-access literature is digital, online, free of charge, and
free of most copyright and licensing restrictions.” Copyright, as mentioned
earlier and discussed in chapter 9, is that form of intellectual property law
that protects the expression of a tangible work product. Copyrightable
works include such things as writings, images and audiovisual products,
sound recordings, sculptures, choreographic works, and computer source
code. Copyrights protect the expression of ideas but not the ideas them-
selves. For example, the words in a journal article are protected by copy-
right exactly as they appear on the page. However, the ideas they contain
or may convey are not protected by copyright. As intellectual property,
copyrights are owned by their creators, but they may be licensed, sold, or
allowed to be used with permission of the creator.
Meetings of interested parties held in Budapest, Hungary (2002);
Bethesda, MD (2003); and Berlin, Germany (2003) gave rise to position
papers that defined OA, made recommendations about its development
and use, and provided a platform for its engagement and endorsement.
The Bethesda Statement on Open Access Publishing defines OA publica-
tion as follows.
An Open Access Publication is one that meets the following two conditions:
1. The author(s) and copyright holder(s) grant(s) to all users a free, irre-
vocable, worldwide, perpetual right of access to, and a license to copy,
use, distribute, transmit and display the work publicly and to make and
distribute derivative works, in any digital medium for any responsible
purpose, subject to proper attribution of authorship, as well as the
right to make small numbers of printed copies for their personal use.
2. A complete version of the work and all supplemental materials, includ-
ing a copy of the permission as stated above, in a suitable standard
electronic format is deposited immediately upon initial publication in
at least one online repository that is supported by an academic institu-
tion, scholarly society, government agency, or other well-established
organization that seeks to enable open access, unrestricted distribu-
tion, interoperability, and long-term archiving (for the biomedical sci-
ences, PubMed Central is such a repository).
Repositories
The repositories mentioned in the previous section are digital archives
into which journal articles are deposited, thus placing the paper into the
public domain. Most notable in this regard is PubMed Central, a reposi-
tory operated by the U.S. National Library of Medicine. In 2008, the NIH
began requiring that all publications reporting research supported by an
NIH grant must be deposited in electronic format on the PubMed Central
site within 12 months of the publication date. This requirement is in the
process of being expanded. In early 2013, the Office of Science and Tech-
nology Policy (an office of the executive branch of the U.S. government)
requested that all U.S. federal agencies “with over $100 million in annual
conduct of research and development expenditures” create plans to in-
crease public access to federally funded research results. There are approx-
imately 20 federal agencies that would fall into this category. Public access
to peer-reviewed publications must be addressed such that the public “can
read, download, and analyze in digital form final peer reviewed manu-
scripts or final published documents.” The plan must use a 12-month post-
publication embargo, similar to the NIH requirement, as a guideline for
making papers publicly available.
This Green OA policy is also employed by funding agencies outside of
the United States. Research Councils UK, the partnership of the seven
Research Councils of the United Kingdom, now requires that papers re-
porting research results obtained under grants from the Research Councils
116 Chapter 4
Preprint servers
In 1991, physicist Paul Ginsparg created a server-based archive for authors
to upload unreviewed manuscripts that would then be freely available in
the public domain. Ginsparg’s original vision in this venture was to provide
an electronic bulletin board intended to serve his colleagues working in
the field of theoretical high-energy physics. Preprints in this discipline had
historically been exchanged by postal mail service, and his rationale was to
“level the research playing field.” That is, his repository would replace this
limited distribution of photocopied manuscripts among selected colleagues
with a globally accessible electronic repository that would serve all levels
of the scientific community from students to senior scientists. He called
his repository arXiv (pronounced “archive,” with the X representing the
Greek letter chi), and within 2 years it had achieved traction as a global
resource for researchers. Among other things, it “became a place to stake
intellectual precedence claims, catalyzing further growth,” according to
Ginsparg. Some 20 years after its launch, arXiv is now hosted and operated
by Cornell University (Cornell University Library), where Ginsparg is a
faculty member. Preprints (called e-prints on the site) hosted on arXiv ex-
ceeded 850,000 in mid-2013 and included manuscripts in the disciplines of
physics, mathematics, computer science, quantitative biology, quantitative
finance, and statistics.
Ginsparg’s creation of arXiv launched a concept that has been repli-
cated extensively since 1991. Today, preprint servers are hosted by scien-
tific societies and other organizations, publishers, universities, specialty
groups, and even individuals. Some are underwritten by government spon-
sors. Preprint servers tend to be discipline specific to a greater or lesser
degree. All embrace the objectives of rapid information dissemination and
the free and open exchange of scientific information. Although some pre-
print servers reserve the right to reject submissions or to change the topic
classification suggested by the authors, arguments based on the lack of
peer review have been made against the concept. Criticisms have centered
Authorship and Peer Review 117
Postpublication review
In the early 2000s, a corporate endeavor was launched that allowed post-
publication peer review online. Originally called F1000—Faculty of 1000
Post-Publication Peer Review, it was composed initially of 1,000 selected
scientists who posted on the F1000 site their comments on peer-reviewed
publications in biomedical fields. In a little more than a decade, this enter-
prise has evolved into three separate services. F1000Prime is now a post-
publication service that publishes “Article Recommendations” made by
the F1000 Faculty. F1000Research is an OA journal covering the life sci-
ences. Articles are published immediately after a preliminary review and
are subject to peer review once posted on the F1000Research site. The
names of the peer reviewers and their comments are published online
with the article. F1000Posters is an OA repository for poster and slide
presentations. F1000Prime now consists of 5,000 scientists and clinical
researchers, assisted by another 5,000 associate faculty members. F1000
reviewers use a rating system of three levels: good, very good, and excep-
tional. Reviewed articles are catalogued and are searchable on the
F1000Prime site. Users of the F1000Prime service pay a fee. Subscribers
to F1000Prime may post comments on the Article Recommendations
made by Faculty. However, subscriber comments that are considered “de-
famatory or otherwise abusive” can be reported and may be removed by
F1000Prime.
Organizations, groups, and individuals also are contributing to the
growth of postpublication peer review using freestanding blogs, social me-
dia, and other online mechanisms. However, with these media, the com-
mentary does not always meet the etiquette prescribed by the policy
mentioned above, and individually sponsored blogs and social media typi-
cally do not have policies that deal with inappropriate remarks or mecha-
nisms in place for removing them. Not unexpectedly, such comments
Authorship and Peer Review 119
Publication metrics
The advent and proliferation of digital journals has accelerated and ampli-
fied the use of metrics associated with scientific papers. The most estab-
lished and influential of these is the journal impact factor (IF). The impact
factor was conceived and developed several decades ago by Eugene Gar-
field, who initially published it under the banner of the Institute for
120 Chapter 4
citations per year, making even the most recent number of retracted papers
a very small fraction of papers in the database.
In another study, Ferric C. Fang, R. Grant Steen, and Arturo Casadevall
reviewed approximately 2,000 biomedical and life sciences papers that had
been retracted as identified in the PubMed database. This resource refer-
ences more than 25 million biomedical research articles published since
the 1940s. Two important points were reported by these authors. First, the
earliest retraction of an article they found was in 1977 (originally pub-
lished in 1973). This suggests that retraction of publications in the bio-
medical literature is a relatively recent development. Second, and more
importantly, their analysis found that that 67% of the retractions were
connected to some form of research misconduct.
Unfortunately, retracted papers may still be incorrectly cited (i.e., cited
without acknowledging that they have been retracted). This could be the
result of oversight or could conceivably be the result of deliberate decep-
tion. Alternatively, confusion caused by retracted papers available on non-
publisher websites—but not noted as being retracted—may contribute to
incorrect or inappropriate citation.
Conclusion
Since the early 1990s, the scientific literature has been increasingly
a ffected by computers and electronic publication. The peer review process
is dependent on electronic communication, as is the actual production of
the journal. Access to electronic versions of the published literature has
created an effective platform for communicating research findings, and the
concept of OA publication offers a new paradigm for both authors and
readers.
Discussion Questions
1. Should all coauthors share equally in the blame and punishment
when fabrication, falsification, or plagiarism is proved to have oc-
curred in a published paper?
2. What sanctions or punishment is appropriate for those who per
petrate fabrication, falsification, or plagiarism in scientific publica-
tions?
3. Should the scientific publication enterprise do more to be able to
detect falsified or fabricated data during the peer review process?
Why or why not?
4. The editors of Nature have taken the position in which they encour-
age “post-publication discussion on blogs and online commenting
facilities as a complement to—but not a substitute for—conventional
peer review.” (See the “Response Required” citation in the “Re-
sources” section below). Critically comment on Nature’s position and
provide your reasoning for supporting or rejecting it.
Case Studies
4.2 Dr. Ethyl Metzger has published five multiauthored papers during
her postdoctoral training. Ethyl shared first authorship on two of
these papers. The names of Ethyl and her co-first author were decided by
a coin toss as indicated in a footnote according to journal policy. In both
cases, Ethyl lost the coin toss and her name appears as the second author
in the byline. Her remaining three publications each have five authors in
their bylines, and Ethyl is third author on two and fourth author on one.
Ethyl is submitting application materials to several institutions to be con-
sidered for faculty positions. On her curriculum vitae she has changed the
order of the authors on her two shared first authorship papers so that her
name appears first instead of second. She is concerned that search com-
mittees reviewing applications may miss any notation indicating shared
first authorship, so she believes the most direct way to assert this is to
have her name first in the citation. Ethyl worries that if she doesn’t do
this there is a risk of her postdoctoral publication record appearing as
though she did not publish a single senior-authored paper. She mentions
this to you over lunch and asks if you have any concerns about her strat-
egy. What do you tell her? If you have concerns, what guidance or advice
do you have for her?
that Aarti’s lab work has delayed submission of this important discovery for
publication. Dr. Costello seeks your advice on whether Aarti has a case for
authorship. What do you tell her? Why?
Dr. Whittaker even suggests that they consider turning over all of the rele-
vant materials, including the raw data, to the institutional research integrity
officer. This could trigger an inquiry into the matter, but Whittaker feels
there has been no wrongdoing. So even if disclosure of the situation to the
research integrity officer results in an inquiry, she and her colleagues would
be exonerated. Do any of these possible strategies have merit? Why or why
not? What advice do you have for Dr. Whittaker?
4.10 Dave Clubman completes his Ph.D. program and leaves the labo-
ratory immediately to attend to personal matters. An important
manuscript based upon his dissertation exists only in a preliminary draft.
During the next year, Professor Holly Franks, his former advisor, attempts
to contact Dave to complete the manuscript. After some months, Dr.
Franks edits the manuscript, prepares the figures, and sends the updated
version to Dave. Dave acknowledges receipt of the manuscript but pro-
vides no comments and does not sign a memorandum acknowledging con-
sent to submit the manuscript. During this period, some results similar to
Dave’s are published by another laboratory. Dr. Franks and a postdoctoral
fellow extend the work and prepare a new manuscript with Dave as first
author and the postdoctoral fellow as an additional coauthor. The manu-
script is sent to Dave by certified mail, but he does not provide any com-
ments nor return a signed memorandum agreeing to submission for
publication. A third party hears that Dave blames Dr. Franks for the delay
and is trying to “give her a hard time.” Dave was supported by federal
funds, and his results were included in annual progress reports to the
granting agency. Can Dr. Franks submit the manuscript and publish it if it
is accepted by the journal? What should be the authorship on the paper?
Should any comments be included in the “Acknowledgments” section?
Resources
Print
Atlas R, Campbell P, Cozzarelli NR, Curfman G, Enquist L, Fink G, Flanagin
A, Fletcher J, George E, Hammes G, Heyman D, Inglesby T, Kaplan S,
Kennedy D, Krug J, Levinson R, Marcus E, Metzger H, Morse SS, O’Brien
A, Onderdonk A, Poste G, Renault B, Rich R, Rosengard A, Salzberg S,
Scanlan M, Shenk T, Tabor H, Varmus H, Wimmer E, Yamamoto K; Jour-
nal Editors and Authors Group. 2003. Statement on the consideration of
biodefence and biosecurity. Nature 421:771.
Carroll MW. 2013. Creative Commons and the openness of open access. N Engl J
Med 368:789–791.
Day RA, Gastel B. 2006. How To Write and Publish a Scientific Paper, 6th ed. Green-
wood Press, Westport, CT.
Fang FC, Steen RG, Casadevall A. 2012. Misconduct accounts for the majority
of retracted scientific publications. Proc Natl Acad Sci USA 109:17028–17033.
Frank M. 2013. Open but not free—publishing in the 21st century. N Engl J Med
368:787–789.
130 Chapter 4
Online
Selected instructions for authors or editorial policies
Journal of Bacteriology
http://jb.asm.org/site/misc/ifora.xhtml
Nature
http://www.nature.com/authors/gta.pdf
Phytopathology
http://apsjournals.apsnet.org/userimages/ContentEditor/1173286505152/phyto_au
thor_instructions.pdf
Authorship and Peer Review 131
Science
http://www.sciencemag.org/site/feature/contribinfo/index.xhtml
Metrics
San Francisco Declaration on Research Assessment (hosted by the Ameri-
can Society for Cell Biology)
http://am.ascb.org/dora/
Open access
Action Plan towards Open Access to Publications, from the Global Re-
search Council:
http://www.dfg.de/download/pdf/dfg_magazin/internationales/130528_grc
_annual_meeting/grc_action_plan_open_access.pdf
Overview
Scientific Integrity: Text and Cases in Responsible Conduct of Research, 4th ed.
by Francis L. Macrina
© 2014 ASM Press, Washington, DC
doi:10.1128/9781555818487.ch5
135
136 Chapter 5
NO: YES
IRB review
and
approval not
needed
Does your research involve “Human being” means a living individual about whom any
interaction or intervention investigator (professional or trainee) obtains information,
with a living human being, including specimens, or any other data by any means; private information
obtaining private information about means that which would allow identification of the individual.
a living human individual?
NO: YES
IRB review
and
approval
not needed
itself. While most researchers and institutions avoid coercing study partici-
pants, subtle coercion may not be apparent to those conducting the research,
let alone the potential subjects for the research. Some of these elements are
difficult to control. Family coercion to participate in some form of therapy is
often strong, even when no clear benefit exists. This is often seen in cancer
chemotherapy, where even though prolongation of survival may be minimal
and treatment fraught with side effects, familial pressure to take treatment
can nevertheless be intense. This is usually related to standard therapy, but
the same factors may pertain in research situations. Studies of genetic pedi-
grees for inherited conditions are much more likely to be revealing if more
family members participate. Family pressure can be extreme in these situa-
tions and even extend to those who do not wish to know if they carry a
Use of Humans in Biomedical Experimentation 141
certain gene (such as that for Huntington’s disease, a terminal condition that
results from genetically programmed degeneration of brain cells).
Different aspects of coercion can become part of the health care system,
as illustrated in the following two examples. First, people without insurance
may join studies to receive basic care that would otherwise be unavailable.
While this has often been a problem in underdeveloped countries, it has also
been a problem in the United States. Under some health insurance plans, in
an effort to decrease costs, physicians have not been allowed to present cer-
tain standard medical alternatives to their patients. Thus, patients in such
situations may face subtle coercion to join a study because all medical op-
tions presented seem inadequate. The second example derives from situa-
tions where only marginally effective standard therapies exist and therapeutic
research is felt by many to be a patient’s best option. Such research compares
the most promising new therapy with the best current (but usually far from
ideal) therapy. In aggressive attempts to control costs, health insurance plans
are limiting a patient’s freedom to embark on therapeutic clinical trials by
calling such trials “experimental.” Nearly all health care policies specifically
exclude experimental expenses. Such denials occur even when the costs of
the study are no greater than those for the standard therapy. An ethical di-
lemma arises when all potential therapies for the disease in question are ex-
perimental. The result may be that even those willing to enroll in large
peer-reviewed clinical trials may not be allowed to participate. Recent regu-
lations do require insurers to pay for patient care costs associated with spe-
cific types of therapeutic trials. However, the burden often falls to the
research subject to work with insurance carriers directly to determine what
costs will be covered, which presents a significant disincentive to participate.
Coercion by the basic researcher (one not licensed to treat patients), phy-
sician, or institution must also be controlled. Researchers are often reim-
bursed in clinical studies on a per-patient basis. The per-patient fee covers
the experimental costs and often a portion of the researcher’s salary and
even the departmental budget. There is thus great incentive to enroll as
many patients as possible. While the basic researcher usually has little to use
to coerce people into participating (other than reimbursement for the ac-
tivity), a physician-researcher has much more power. To a large and ever-
increasing extent, the physician controls the patient’s access to the U.S.
health care system and is often entrusted to make medical decisions for the
patient. Many patients refuse to even question their physicians about these
decisions, in part because they trust them, since they possess requisite spe-
cialized knowledge, and in part because of paternalistic (or maternalistic)
attitudes held by many physicians. Under such circumstances, it is easy for
patients to feel that if they decline to participate in a study, they may lose a
precious doctor-patient relationship and even access to the health care sys-
tem. Such issues must be addressed through consent forms and patient
142 Chapter 5
IRBs
OHRP. The OHRP is the arm of the HHS charged with the oversight of
human research that is federally funded in the United States. The Federal-
wide Assurance commits an institution to adhering to the HHS regula-
tions governing human subjects research. Institutions may choose to apply
the regulations to all research or limit the assurance to only federally
funded research.
Committees similar to the IRB are found in other countries, but their
rules and composition vary. Rules pertaining to the formation of U.S. IRB
committees are relatively simple. The committee must include at least five
members, and the membership list must be filed with the U.S. Secretary of
Health and Human Services and the Food and Drug Administration (FDA)
if the institution conducts FDA-regulated research. All five members can-
not have the same profession, and there must be at least one member with
primary concerns in nonscientific areas (often a lawyer, ethicist, or mem-
ber of the clergy). There must also be at least one member not affiliated
with the institution or with family so affiliated. The nonaffiliated member
may also be the nonscientific member. Most academic institutions have
larger committees than required to ensure adequate expertise for the re-
view of research.
Approval of projects requires a simple majority vote. At least one non-
scientific member of the committee must vote but does not have to vote
for approval. No member is allowed to participate in the review of a project
in which he or she has a personal interest. The committee may invite ex-
perts to appear, but such experts may not vote. Proposals must be rere-
viewed at least yearly, and there must be written procedures that prescribe
the operations of the committee. An institution’s selection on the Federal-
wide Assurance to apply the regulations to all or to only federally funded
research determines whether all or only some serious or continuing non-
compliance in research or with the IRB review process must be reported to
the OHRP.
The committee is charged with specific criteria with which to review
proposals. First, the risks to subjects must be minimized consistent with
the aims of the research. Ideally, proposed procedures would be those al-
ready being performed for diagnostic or therapeutic purposes. For re-
search to be ethically valid, it must first be technically valid. Even a study
with minimal risk requires that valid scientific results are to be obtained, or
it cannot be justified. This is most often a problem with small clinical stud-
ies in which statistically valid data may be difficult to obtain. Common
reasons for such small studies include:
• Study of a rare disease or disorder. These are often called “orphan dis-
eases.” Traditionally, pharmaceutical companies have had little inter-
est in pursuing clinical trials of drugs to treat orphan diseases because
144 Chapter 5
These types of studies must have clearly defined endpoints so the IRB
can determine their risk-to-benefit ratio. Valid endpoints can include de-
termination of treatment toxicity, patient compliance, or drug pharmaco-
kinetics. Attempting to determine efficacy of treatments with too few
patients, however, will likely create problems at the IRB. Statisticians, in
particular, will instantly realize that the chances of determining efficacy
with a small population are nil unless dramatic changes are found in easily
measured outcomes. A good statistical analysis is often essential for proper
study design and can save time and unnecessary effort with the IRB, with
granting agencies, and subsequently with data analysis.
Most important to the IRB review, the risks to subjects must be reason-
able in relation to anticipated benefits. Study benefits include benefits to
the research subject as well as the importance of the knowledge that may
reasonably be expected to result. In assessing the risk-to-benefit ratio of
the project, only the risks and benefits of the research should be consid-
ered. Risks of procedures that would still be performed if not included in
the study should not be considered. Similarly, a beneficial procedure per-
formed as part of a study cannot be considered a benefit if the same proce-
dure would be performed without the study.
For clinical studies in which two different treatments are being com-
pared, there must be a valid null hypothesis that the two arms are equiva-
lent. This is the concept of equipoise, that neither of the two treatments is
known to be better. The researcher should be able to honestly say that
there are no convincing data indicating that one arm is better. If one arm is
known to be better, the point of the study is moot and the research is no
longer ethical. This includes placebo-controlled studies, in which the test
treatment is compared with no treatment at all. Such studies may be rea-
sonable if the efficacy of the treatment being tested is not known and there
is no known efficacious therapy.
The committee is prohibited from considering long-range effects on
public policy that may result from the research. For example, in reviewing a
Use of Humans in Biomedical Experimentation 145
may recommend stopping a study for cause, including undue risk to par-
ticipants or clear evidence that the data support a conclusion that argues
against continuing the research.
Informed consent is one of the basic tenets of protecting the rights and
welfare of research subjects. The concept of informed consent stems di-
rectly from the Belmont principle of Respect for Persons. IRBs must en-
sure that informed consent is sought from each prospective subject or his
or her legally authorized representative, unless adequate justification is
made to waive the consent process. If the IRB approves the process, those
unable to consent but who have an appropriate legal representative or
guardian may participate if the representative gives informed consent. All
consents must be properly documented unless the IRB waives the need for
signature. The informed consent document must contain specific infor-
mation such as the purpose of the research, the research procedures, and
risks and benefits of participation.
Special provisions must be made for studies in which some or all of the
subjects are likely to be vulnerable to coercion or undue influence. The
regulations afford specific protections to pregnant women and fetuses,
children, and prisoners. Other vulnerable populations considered by the
IRB include people with acute or severe physical or mental illness and
those who are economically or educationally disadvantaged. One such
safeguard could be to have a patient representative to ensure that when
studies are complicated and involve acute medical situations or include
people with limited education, subjects completely understand all implica-
tions. Consent forms must be read to those who cannot read (or read well)
and should be written so they are easy to understand. It often helps to have
the consent form reviewed by those used to dealing with the educationally
disadvantaged.
There is an increasing trend for consent forms to be approved by cen-
tral authorities for large projects involving substantial numbers of people.
While this may seem intrusive, such efforts have so far yielded high-quality
consent forms by employing people with expertise in the creation of such
forms and who are skilled in presenting complex topics in lay language.
While a written informed consent document continues to be the norm,
study sites are increasingly integrating technology, such as video, into the
process in an effort to simplify consent information and to enhance com-
prehension and retention.
What should be included in an informed consent? Consent forms ful-
fill several roles in human research. They are designed to describe the
study in detail, including risks and benefits. They can, however, also be a
Use of Humans in Biomedical Experimentation 147
Many committees have procedures for expedited review for specific types
of research involving no more than minimal risk. Expedited review may be
conducted by one or more IRB committee members rather than by the
full, convened IRB. As with exempt research, study conduct must be lim-
ited to certain types of procedures to qualify for expedited review. These
include procedures listed below, adapted from the Code of Federal Regu-
lations (45 CFR 46).
Prospective collection of:
Human Experimentation
Involving Special Populations
Incompetent patients
It is often assumed that those with mental illness or those who are not
able to provide informed consent must be excluded from all studies. This
is not the case. Consent must be provided by the legally responsible per-
son, and the study must be designed in such a way that adequate safe-
guards exist for the participants. It would seem unfair to deprive these
people of the right to participate in potentially therapeutic studies or to
prevent information from being gained to help people with mental disor-
ders. Clearly, the IRB and the researchers must ensure that individual
rights are respected. They must also take into account that participating
in arduous programs without being able to understand the reason for the
treatments makes such programs much more difficult to endure. This
type of research (certain chemotherapy trials, for example) may therefore
be inappropriate for certain populations. Psychiatric patients may be es-
pecially vulnerable emotionally. Particular attention must be paid to
avoid covert (and likely unintentional) coercion. Furthermore, it has been
suggested that research personnel should use the medical definitions of
informed consent for certain studies in this patient population rather
than the more comprehensive information usually required, in an effort
to reduce patient anxiety. Thus, the IRB has special responsibilities for
protocols involving these patients.
Prisoners
Prisoners constitute an excellent example of a population that requires ad-
ditional safeguards for consent for scientific study. The nature of incarcer-
ation affords numerous potential coercions, and thus federal regulations
specifically offer additional safeguards for this population. Only certain
types of federally sponsored research can be performed on prisoners.
These include:
• Studies of possible causes, effects, and processes of incarceration or
criminal behavior that present no more than minimal risk or incon-
venience to the prisoner.
• Studies of prisons as institutional structures or of prisoners as incar-
cerated persons.
• Research on conditions affecting prisoners as a class, such as vaccine
studies on hepatitis due to the increased incidence of hepatitis in
prisons or social or psychological problems such as alcoholism or
drug addiction. The Secretary of Health and Human Services must
consult with experts in penology, medicine, and ethics and give no-
tice in the Federal Register of intent to approve such research.
Use of Humans in Biomedical Experimentation 151
There are very specific requirements for the IRB when reviewing re-
search involving prisoners, including the requirement that a prisoner or a
prisoner representative must be a member of the IRB. A prisoner represen-
tative must have the appropriate background and experience to serve as a
true representative of the prisoners. Another requirement is that a majority
of the IRB (exclusive of prisoner members) must have no association with
the prisons involved. There is no requirement that the prisoner or prisoner
representative must vote for a given proposal for it to be enacted.
The IRB must further determine that any advantages gained by the
prisoner by participating are not of such magnitude that the prisoner’s
ability to weigh the risks of participation is impaired. These would include
advantages in living conditions, medical care, food quality, amenities, po-
tential earnings, and outside contacts. The risks involved must also be risks
that would be accepted by nonprisoner volunteers. Study information
must be presented in a manner the population can understand.
Selection of subjects in prison must be fair to all prisoners and cannot
be arbitrarily used or influenced by prisoners or prison authorities. Studies
must not be used as a reward or method to control the inmate population.
Participation in scientific or medical studies cannot be taken into account
by parole boards in determining eligibility for parole. The prisoner must
be specifically informed that parole considerations will not be affected. Al-
lowing participation to affect parole would be an example of undue influ-
ence or coercion to participate.
Where follow-up is required, arrangements must be made for the vari-
ous lengths of sentence of the prisoners. The researchers should also con-
sider the likelihood of noncompliance after the sentence is over. The
potential import of these arrangements is illustrated by the case of a
35-year-old prisoner who developed testicular cancer while incarcerated.
The prisoner was placed on a standard, noninvestigational therapy with his
consent. With aggressive chemotherapy, testicular cancer is largely cur-
able. After the first course of chemotherapy resulted in a good response,
the court, at the county’s request, paroled the prisoner. The reason for pa-
role was not made clear to the medical staff, but it was suspected that ei-
ther it was a compassionate parole (which seemed strange for a largely
curable, as opposed to terminal, cancer) or the county did not wish to pay
the costly medical bills for the therapy. The prisoner, who had tolerated
the chemotherapy well, left the hospital against medical advice in the mid-
dle of a treatment, saying he had “things to do.” He never returned for the
152 Chapter 5
needed therapy and was lost to follow-up. While it was clearly his right to
leave, it is also likely that the cancer recurred. Recurrent cancer has a di-
minished prognosis and if left untreated is usually fatal. If the prisoner had
been on a study, it is certain he would not have continued with it. In this
particular case, some of the medical staff thought that the county, by parol-
ing the prisoner, had converted his sentence to a death sentence (albeit
with the prisoner’s unintentional collaboration).
Children
The regulations include special protections for the involvement of chil-
dren in research. The definition of a child varies from state to state, with
most indicating the age of majority to be 18. IRBs and investigators must
be aware of the legal age of majority for the location in which research
will occur. For minors, parents or guardians must give consent. When
research involves significant risk, both parents must consent when avail-
able, unless only one parent has legal responsibility or custody. In addi-
tion to parental consent, the assent or agreement of the child is required
when the IRB deems that he or she is capable. In making this determina-
tion, the IRB must consider the age, maturity, and psychological state of
the children involved. This can be done for all children involved in a given
protocol or individually. If the IRB determines that the capacity of the
child is too limited or if the research may offer benefits important to the
health or well-being of the child, assent is not required.
It has been pointed out that certain behaviors commonly accepted in
society put children at much greater risk than do most research studies.
Gideon Koren, Daphna Birenbaum Carmeli, Yoram Carmeli, and Robert
Haslam calculated the risk of a babysitter having to deal with a severe
medical emergency in Canada. They calculated that each year at least 900
Canadian babysitters would have to deal with an acute asthmatic attack in
one of their charges and that 26 would likely have a child who experiences
sudden infant death syndrome while under their care. These situations
would place the babysitters, often between the ages of 10 and 15, at risk of
emotional trauma far greater than would most research studies. The work
of Koren et al. suggests that if a child is deemed mature enough to super-
vise younger children in potentially extremely dangerous situations, he or
she should be able to consent to most research studies.
Children who are wards of the state or any other agency can be in-
cluded in research only if the research is either related to their status as
wards or conducted in institutions in which the majority of children in-
volved are not wards. In such cases, the IRB shall require appointment of
an advocate—not associated with the research, the investigator, or the
guardian organization—who agrees to act in the best interests of the child
for the duration of the child’s participation in the research.
Use of Humans in Biomedical Experimentation 153
Additional restrictions are imposed for research with greater than mini-
mal risk. However, when there is greater than minimal risk but also the pos-
sibility of direct benefit to the child, the IRB must determine that the risk is
justified by the anticipated benefits. The risk-to-benefit ratio must also be at
least as good as that of all alternative approaches. When there is no prospect
of direct benefit but the research is likely to yield important knowledge
about a disorder, the risk must represent a minor increase over minimal
risks. The interventions must be comparable to those inherent in the actual
or expected medical, dental, social, or educational situations. The informa-
tion to be obtained must be of vital import for the understanding or amelio-
ration of the subject’s disorder or condition. To bypass these restrictions,
there must be a reasonable opportunity to achieve further understanding,
prevention, or alleviation of a serious problem affecting the health or wel-
fare of children. Nevertheless, the Secretary of Health and Human Services
must consult with a panel of experts and ensure that such a condition exists
and that the research will be ethically conducted.
These restrictions may seem excessive and may indeed slow research in
some areas. It must be remembered, however, that for children who are not
old enough to consent, the parents and the IRB remain their sole advocates.
There is even some indication that parents who volunteer their children for
studies may be psychologically different from those who do not, making the
issue of study regulation and control even more important.
More recently, efforts have been made to ensure that children are incor-
porated into studies of most new medications. This is part of an effort to
include all underrepresented groups in research studies to ensure wide-
spread applicability of the results. Efforts to include women and minorities
are also under way. Many medications routinely used in pediatrics have not
been studied in children but are merely used after approval for adults. By
requiring pediatric studies (i.e., in persons less than 21 years old) for most
medications, it is hoped that this situation can be reversed.
will be removed from the covered entity during the review, and (iii) the use
is necessary for research purposes.
There are three basic ways that research can be done without individual
authorization under the Privacy Rule: (i) doing research with deidentified
data sets, (ii) utilizing a limited data set, or (iii) obtaining a waiver from an
IRB or privacy board.
Deidentified information is not considered PHI and as such is not gov-
erned by the Privacy Rule, and no Authorization or waiver is necessary for
its use or disclosure. The most common method of deidentifying health
information is to remove all identifiers of the individual and of the individ-
ual’s relatives, employers, and household members. An exhaustive list of 18
possible identifiers is defined in the Privacy Rule.
The Privacy Rule allows for the use of a limited data set for research
purposes without obtaining patient authorization. Such a data set may
contain a limited number of identifiers, including geographic address
(above the street level) and dates. A limited data set is often a useful path-
way for researchers conducting retrospective chart review research.
As with informed consent, a researcher may seek to waive the require-
ment to obtain Authorization when there is minimal risk to subject privacy
and when it is not feasible to conduct the research without Authorization.
The waiver must be granted by a privacy board, which is often an IRB but
may be a separate compliance body within an institution. Many IRBs have
accepted a dual role and also serve as a privacy board, reviewing access to
PHI as part of their overall review of privacy protections.
Clinical research will not generally qualify for a waiver of Authorization
if a clinical research participant will be asked to sign an informed consent
before entering the study. In such circumstances it is relatively easy to have
a second HIPAA consent or to incorporate HIPAA language into the over-
all consent. Waiver of Authorization is more common in research that in-
volves, for example, retrospective medical chart reviews.
It should be stressed that the regulations of the Privacy Rule and those
regulating human research from HHS and the FDA are independent and
the rules of each must be followed completely. The HHS and FDA Protec-
tion of Human Subjects Regulations are concerned with the risks associ-
ated with participation in research. These may include, but are not limited
to, the risks associated with investigational products and experimental or
research procedures and the confidentiality risks associated with the re-
search. The Privacy Rule is concerned with the risk to the subject’s privacy
associated with the use and disclosure of the subject’s PHI.
The FDA regulations apply only to research over which the FDA has
jurisdiction, primarily research involving investigational products. The
HHS Protection of Human Subjects Regulations apply only to research
that is conducted or supported by HHS or under an applicable
156 Chapter 5
Conclusion
Biomedical researchers thus have both ethical and legal obligations. Re-
search using human subjects demands careful planning that will pass rigor-
ous peer review before the performance of any experimentation. Scientists
wishing to do human subjects research must be conversant with the appli-
cable policies and regulations.
Controversy still abounds about the best way to ensure appropriate and
efficient monitoring of human research. For example, there remain diffi-
cult questions such as whether IRBs could be biased in favor of research
projects that aid their organization and whether national IRBs could do a
better job ensuring uniformity and increasing efficiency for protocols run
at multiple sites. Federal regulations requiring conflict-of-interest policies
and oversight have been updated, and now institutions must collect finan-
cial disclosures from investigators so that institutional committees are able
to evaluate and manage potential bias based on financial incentives. The
outcomes of such deliberations are to be shared with IRBs so that the ade-
quacy of how a conflict of interest is managed can be evaluated in light of
human research participant protections. IRBs have the authority to require
additional protections to help minimize potential bias. Frequently, IRBs
will require that financial relationships be disclosed during the informed
consent process. Additionally, IRB members must recuse themselves from
the review of any research where they have a real or perceived conflict of
interest, financial or otherwise.
Other topic areas discussed in this book also have strong implications
for human subjects research. Record keeping (chapter 10) plays heavily
into clinical research with humans in terms of maintenance, form, storage,
retention, and confidentiality of results. Conflicts of interest (chapter 7)
must be frequently dealt with in clinical research. For example, investiga-
tors need to disclose industrial support or commercial affiliations at vari-
ous stages in the project, e.g., to IRBs, patients, editors, and reviewers.
Finally, issues relating to collaborative research (chapter 8) and authorship
(chapter 4) are common in human subjects experimentation owing to the
frequent interdisciplinary nature of this research.
Discussion Questions
Case Studies
not obvious to his colleagues. He has been told by his physician that he
probably has a syndrome known as “chronic dermal condition” (CDC),
the cause of which is unknown and for which there is no effective treat-
ment. To confirm this unusual disease, a skin biopsy must be done. Dr.
Weinstein has not yet had a biopsy. In his latest package of assignments
for IRB review, Dr. Weinstein receives a protocol that proposes to study
CDC. To qualify for the study, a participant must have a confirmed diag-
nosis of CDC, and a skin biopsy will be performed on all who sign up to
be considered for enrollment. The study has two components: an evalua-
tion of factors that may be related to the causation of CDC and the mon-
itoring of the response of CDC to a combination of experimental drugs
that has shown promise in other clinical trials. Dr. Weinstein is impressed
with the study and submits a favorable review. Further, he decides to pur-
sue enrolling in the study. He reasons that at least he can get a definitive
answer about his CDC diagnosis by submitting to a skin biopsy. At most,
if he has CDC, he may benefit from the experimental therapy. He comes
to you, chair of UMC’s IRB, to let you know his intentions. What will
you tell him?
include a statement at the beginning of her survey stating that the study
has the full support of the city school district. Mr. Ashe wants to advertise
his cooperativeness to his peer school districts. Moreover, he tells Dr.
Kachina that this statement will read like a “seal of approval,” maximizing
participation in the study. Dr. Kachina knows that if she modifies her
survey she will have to have it reviewed again by the IRB, thus delaying
the start of her research. She makes a counterproposal to Mr. Ashe, ask-
ing him to prepare a one-page announcement that delivers the school
district’s message of support for the project. Dr. Kachina suggests that
this be printed on bright yellow paper and that it be stapled to the survey
instrument when it is distributed to the students. Mr. Ashe finds this pro-
posal acceptable and prepares the announcement. Comment on the eth-
ics and the legality of what has happened. Is this study still in IRB
compliance? Why or why not?
Preamble
1. The World Medical Association (WMA) has developed the Declara-
tion of Helsinki as a statement of ethical principles for medical re-
search involving human subjects, including research on identifiable
human material and data.
The Declaration is intended to be read as a whole and each of its
constituent paragraphs should be applied with consideration of all
other relevant paragraphs.
2. Consistent with the mandate of the WMA, the Declaration is ad-
dressed primarily to physicians. The WMA encourages others who
are involved in medical research involving human subjects to adopt
these principles.
General Principles
3. The Declaration of Geneva of the WMA binds the physician with
the words, “The health of my patient will be my first consideration,”
and the International Code of Medical Ethics declares that, “A
physician shall act in the patient’s best interest when providing med-
ical care.”
†
Disclaimer: © 2013 World Medical Association, Inc. All rights reserved. All intel-
lectual property rights in the Declaration of Helsinki are vested in the World Medi-
cal Association. Reprinted with permission of the World Medical Association.
Use of Humans in Biomedical Experimentation 165
Informed Consent
25. Participation by individuals capable of giving informed consent as
subjects in medical research must be voluntary. Although it may be
168 Chapter 5
Use of Placebo
33. The benefits, risks, burdens and effectiveness of a new intervention
must be tested against those of the best proven intervention(s), ex-
cept in the following circumstances:
Where no proven intervention exists, the use of placebo, or no
intervention, is acceptable; or
Where for compelling and scientifically sound methodological
reasons the use of any intervention less effective than the best
proven one, the use of placebo, or no intervention is necessary to
determine the efficacy or safety of an intervention and the patients
who receive any intervention less effective than the best proven
one, placebo, or no intervention will not be subject to additional
risks of serious or irreversible harm as a result of not receiving the
best proven intervention.
Extreme care must be taken to avoid abuse of this option.
Post-Trial Provisions
34. In advance of a clinical trial, sponsors, researchers and host country
governments should make provisions for post-trial access for all
participants who still need an intervention identified as beneficial
170 Chapter 5
Resources
Print
Altman LK. 1998. Who Goes First? The Story of Self-Experimentation in Medicine.
University of California Press, Berkeley, CA.
Bankert E, Amdur R. 2005. Institutional Review Board Management and Function,
2nd ed. Jones and Bartlett, Boston, MA.
Beecher HK. 1966. Ethics and clinical research. N Engl J Med 274:1354–1360.
Fulford KW, Howse K. 1993. Ethics of research with psychiatric patients: princi-
ples, problems and the primary responsibilities of researchers. J Med Ethics
19:85–91.
Harth SC, Johnstone RR, Thong YH. 1992. The psychological profile of parents
who volunteer their children for clinical research: a controlled study. J Med
Ethics 18:86–93.
Use of Humans in Biomedical Experimentation 171
Jones JH. 1993. Bad Blood: the Tuskegee Syphilis Experiment. The Free Press, New
York, NY.
Kahn JP, Mastroianni AC, Sugarman J (ed). 1998. Beyond Consent: Seeking Justice
in Research. Oxford University Press, New York, NY.
Koren G, Carmeli DB, Carmeli YS, Haslam R. 1993. Maturity of children to
consent to medical research: the babysitter test. J Med Ethics 19:142–147.
Presidential Commission for the Study of Bioethical Issues. 2012. A Study
Guide to “Ethically Impossible” STD Research in Guatemala from 1946 to 1948.
Presidential Commission for the Study of Bioethical Issues, Washington, DC.
http://bioethics.gov/sites/default/files/Study%20Guide.pdf.
Reverby SM. 2009. Examining Tuskegee: the Infamous Syphilis Study and Its Legacy.
University of North Carolina Press, Chapel Hill, NC.
Sugarman J, Mastroianni AC, Kahn JP (ed). 1998. Ethics of Research with Human
Subjects: Selected Policies and Resources. University Publishing Group, Frederick,
MD.
Online
The general reference used in preparation of this chapter was the Code of
Federal Regulations, Title 45 Part 46, Protection of Human Subjects. This
is available online at the website of the U.S. Public Health Service Office
for Human Research Protections (OHRP):
http://www.hhs.gov/ohrp/humansubjects/guidance/45cfr46.html
IRB: Ethics and Human Research provides a wealth of practical and useful
information for those interested in human research. This periodical is
published by the Hastings Center (Hastings-on-Hudson, NY) and is avail-
able in most university and medical center libraries. The current table of
contents of this publication may be found online at
http://www.thehastingscenter.org/
Registry listing human embryonic stem cell lines eligible for NIH
funding:
http://grants.nih.gov/stem_cells/registry/current.htm
Appendix material
Appendix IV of this book contains the text of a human subject protocol as
well as examples of informed consent forms.
chapter 6
Introduction
A consensus challenged
Animal experimentation has been an important, long-standing research
tool. At the dawn of the 19th century, scientific medicine was beginning to
challenge medical traditions more than 1,000 years old. Physiological re-
search involving animals was one of the key technologies that spurred this
transition and led to an understanding of bodily functions and the physical
basis of disease. However, the new approach was resisted by traditionalists
who employed as one of their foremost criticisms the cruel nature of ani-
mal research. Present-day scientists should not delude themselves: early
animal experiments could be exceedingly brutal. Fully conscious dogs were
nailed to boards by their four paws, before being cut open, so that the beat-
ing of a heart might be observed. While the advent of anesthesia in the
mid-1800s addressed some concerns, it by no means ended the debate over
the fundamental morality of animal research. Numerous groups formed in
the late 1800s to challenge the existing social order with regard to animals.
These “antivivisectionists” were the antecedents of the contemporary “an-
imal rights” movement.
In 1975, Peter Singer, an Australian philosopher, first published the
book Animal Liberation, which many believe was the seminal event in the
rebirth of modern antivivisectionism. Since that time, animal rights activ-
ists have assiduously set about achieving their ultimate goal—the abolition
of the use of animals for biomedical research, for food and clothing, and
Scientific Integrity: Text and Cases in Responsible Conduct of Research, 4th ed.
by Francis L. Macrina
© 2014 ASM Press, Washington, DC
doi:10.1128/9781555818487.ch6
173
174 Chapter 6
for entertainment. The most extreme activists even question the morality
of pet ownership. The animal rights movement is viewed by many scien-
tists as a threat to scientific progress and, ultimately, to the health and well-
being of humankind. But the majority of scientists have not actively
participated in the debate by responding to the charges of the animal rights
activists at the local level, preferring instead to allow a defense to be
mounted by national scientific organizations. This is arguably a serious
mistake. The animal rights organizations have been quite successful in car-
rying their message to the general public. While the majority of the popu-
lation still expresses support for the use of animals in biomedical research,
the efforts of animal rights activists have clearly eroded this support, espe-
cially among young people. Additionally, the animal rights movement has
sought to link its agenda with that of other popular causes, such as envi-
ronmentalism, saying in essence, “If you care about our environment, you
must support animal rights.”
It is important that individual scientists take the time to become better
educated about the moral and political controversies that surround the use
of animals in biomedical research. Scientists often have a tendency to dis-
miss the animal rights philosophy as irrational. Yet the movement’s leading
philosophers, people like Peter Singer and Tom Regan, are respected schol-
ars who have presented eloquently argued, and intensely rational, cases for
their belief in animal rights. Inadequately prepared scientists can embarrass
themselves and the larger scientific community when trying to debate some
of the articulate, well-prepared leaders of the animal rights community. One
will not catch these individuals in trivial moral blunders—they do not eat
meat, wear leather shoes, or frequent the circus. Many of them struggle to
live an ethically consistent (and difficult to maintain) lifestyle because of the
moral status that they ascribe to animals. The fact that scientists are often
unfamiliar with the ethical theories of the leading animal rights philosophers
is bound to reduce their effectiveness in any public debate of the issues.
Scientists occasionally have a tendency to dismiss all animal rights ac-
tivists as the members of a “lunatic fringe.” This view is untenable. The
vast majority of people in attendance at animal rights meetings are not lu-
natics, but rather people just like our neighbors. It is important to realize
that most of the people at such meetings are not fervent animal rights ac-
tivists. They continue to eat meat, value the benefits of medical research,
and own pets, no matter what their leadership might have to say about
these practices. These people are, however, extremely concerned about
how the animals used in biomedical research are being treated. And unfor-
tunately, their major source of information is often the animal rights
groups themselves. Because of this, they are often inherently distrustful of
the scientific establishment. It is not likely that any impersonal scientific
Use of Animals in Biomedical Experimentation 175
that is about to be destroyed, but rather a tissue culture flask full of living
animal cells. Clearly, the senseless destruction of a mouse is more trou-
bling than that of a flask of cells. Therefore, it is not the mere fact that the
mouse is alive that we are responding to—it must be something else.
Moral judgments
At some level, many scientists are abolitionists. That is, if we were able to
acquire the information needed to adequately answer compelling research
questions without the use of animals, who among us would not gladly do
so? Nevertheless, one of the best methods we have developed to advance
biomedical knowledge involves the use of animals, which, unlike the test
tube, have interests. They have interests in obtaining sufficient food, in
remaining free from pain, in reproducing themselves, and perhaps in living
a normal life span. Experiments can frustrate the interests of laboratory
animals, and most scientists recognize this both in their concern for the
humane treatment of animals and in their belief that research should be
directed at important problems. The fact that animals have interests does
not necessarily mean that we should never use them in biomedical experi-
ments; however, it does mean that any such use should be preceded by a
moral judgment. Do the benefits derived from the biomedical research
that is being considered offset the associated moral costs?
Animal rights groups are challenging the existing societal consensus on
many questions involving animals. Their actions will undoubtedly have an
influence on public policy decisions that will be made whether or not sci-
entists choose to participate in the ongoing debate over the issues.
We have seen that experimenters reveal a bias in favor of their own species
whenever they carry out experiments on nonhumans for purposes that they
would not think justified them in using human beings, even brain damaged
ones. This principle gives us a guide toward an answer to our question. Since
a speciesist bias, like a racist bias, is unjustifiable, an experiment cannot be
justifiable unless the experiment is so important that the use of a brain-
damaged human would also be justifiable.
178 Chapter 6
It is clear that Singer does not believe that very much animal research
would be able to overcome this obstacle. It is also clear that he does not
believe this loss to be a serious one. He believes that “animal experimenta-
tion has made at best a very small contribution to our increased lifespan.”
For Singer the benefits of animal research (or of meat eating) are not
worth the moral costs.
In his writings, the late R. G. Frey, a fellow utilitarian, criticized Singer’s
philosophy. Frey defended the use of animals in medical research using
essentially the same utilitarian ethic as does Singer. In some of their writ-
ings it is difficult to understand where Frey and Singer differ in method,
even though they differ radically in their conclusions. Frey, too, believed
that animal research must pass a test similar to the one described by Singer.
Frey believed that it would be wrong to perform an experiment on an ani-
mal if we were not willing to perform it on a human with an even lower
quality of life (e.g., an orphaned infant born without a brain). However,
Frey recognized the benefits that flow from animal research and seemed
intent on preserving them. Therefore, while he maintained that we should
be willing to perform such human experiments, he also recognized reasons
why we might choose not to. The side effects of such human research (e.g.,
societal uproar, outraged relatives) may outweigh the benefits derived and
thereby cause us to refrain from conducting them in the first place.
Singer’s claim that speciesism is analogous to racism has also been criti-
cized. Peter Carruthers, a British philosopher and supporter of animal re-
search, believes that species membership is a morally relevant characteristic,
as do Stephen Post and Carl Cohen. Animal rights philosopher Mary Midg-
ley, who is clearly willing to demand limitations on the use of animals in re-
search, also rejects the speciesism-racism analogy. She argues that “race in
humans is not a significant grouping at all, but species in animals certainly is.
It is never true that, in order to know how to treat a human being, you must
first find out what race he belongs to. . . . But with an animal, to know the
species is absolutely essential.” For Midgley, there are morally significant
bonds between species members just as there are between the members of a
family. However, these species bonds are not absolute, and it is important to
realize that we also form significant bonds with members of other species.
them. For the rights view in other words, rights are more basic than utility
and independent of it, so that the principle reason why, say, murder is wrong,
if and when it is, lies in the violation of the victim’s moral right to life, and
not in considerations about who will or will not receive pleasure or pain or
have their preferences satisfied or frustrated, as a result of the deed. Those
who subscribe to the rights view need not hold that all moral rights are abso-
lute in the sense that they can never be overridden by other moral consider-
ations. For example, one could hold that when the only realistic way to
respect the rights of the many is to override the moral rights of the few, then
overriding these rights is justified.
animal. Either animals are in the category of beings that possess inherent
value or they are not. “One either has it, or one does not. There are no in-
betweens. Moreover, all those who have it, have it equally. It does not come
in degrees.” When pressed to delineate the exact point of demarcation be-
tween those beings said to possess inherent value and those who do not,
Regan deflects the question as essentially moot. “Whether it belongs to
others—to rocks and rivers, trees and glaciers, for example—we do not
know and may never know. But neither do we need to know, if we are to
make the case for animal rights. We do not need to know, for example, how
many people are eligible to vote in the next presidential election before we
can know whether I am.” But Regan’s position does not imply that he be-
lieves that there are no moral differences between animals and humans. If
there are five individuals (four humans and a dog) who seek sanctuary in a
lifeboat that can hold only four of them, what should be done? Regan be-
lieves that it is the dog that should be thrown overboard to die. He argues
that while the inherent value of each of these beings is equivalent, the harm
that would be done to them through their deaths is not. Humans have a
much greater range of possibilities open to them in their lives than do dogs.
Humans can experience joys and satisfactions that no dog will ever experi-
ence. Because of this, death forecloses far more potential opportunities for
satisfaction in the human than it will in the dog. Regan argues that it would
be allowable to throw even 1 million dogs overboard to save the humans
because each dog’s death, when considered one at a time, is less harmful
than the death of a human considered one at a time.
One might imagine, from such a position, that Regan would be disposed
to permit animal research that could save the lives of humans. However,
Regan’s position is, if anything, more severe than Singer’s on the question of
animal research. Regan states that his ethic requires the immediate abolition
of all such research. Why isn’t medical research seen as analogous to the
lifeboat ethics described above? In the lifeboat example, all (including the
dog) would have perished if one individual were not sacrificed. A decision
had to be made as to whether a human or a dog had to die so that the others
could live. Regan does not see that choice as analogous to using animals in
research on human disease. The animals are not in the lifeboat, because they
are not sick. No decision has to be made to sacrifice one or the other. In
Kantian terms, one can imagine that Regan believes that medical research
uses animals merely as a means and not also as an end.
While Regan is quite comfortable with his abolitionist position, it
should be noted that he, like Singer, does not seem to view the loss of the
ability to use animals in research as having grave consequences for medical
advances. Regan writes, “Like Galileo’s contemporaries, who would not
look through the telescope because they had already convinced themselves
of what they would see and thus saw no need to look, those scientists who
Use of Animals in Biomedical Experimentation 181
Legislation
Scientists no longer have the luxury, or burden, of being the sole arbiters
of the acceptability of their own experiments. In the early days of animal
research, there was little to restrict scientists’ use of animals other than
their own individual consciences. Scientists work under a number of
restrictions—legal, institutional, and moral—that constrain how animals
may be used in experiments.
Table 6.1 presents a brief history of legislation and regulations pertain-
ing to animal care and use. In 1963, the National Institutes of Health
(NIH) published the first edition of its Guide for the Care and Use of Labora-
tory Animals. At first, compliance with the recommendations set out in the
guide was voluntary. The movement to pass restrictive legislation on ani-
mal use gained momentum in early 1966 when an article in Life magazine
caused public outrage by chronicling the despicable conditions under
which many animal dealers maintained their dogs. In August 1966, Con-
gress passed the Laboratory Animal Welfare Act. A major goal of this leg-
islation was to require the registration of research facilities and dog dealers
with the U.S. Department of Agriculture. A clear intent of the bill was to
minimize the number of instances of people’s cats and dogs being stolen
and sold to research institutions. These institutions were now required to
buy their cats and dogs from licensed dealers. This legislation was amended
in 1970, 1976, and 1985 and is now referred to as the Animal Welfare Act
(AWA). The legislation mandated humane care and treatment for dogs,
cats, rabbits, hamsters, guinea pigs, and nonhuman primates. However, it
provided no protection for rats and mice, the two species that account for
the vast majority of all animals used in research.
It was not until 1985 that Congress passed the Health Research Exten-
sion Act of 1985 (Public Law 99-158). This was the first law concerning
animals under which the U.S. Public Health Service (PHS) was required
to operate. This law, in effect, caused the heretofore voluntary Public Health
Service Policy on the Humane Care and Use of Laboratory Animals (1986) to
become mandatory for both PHS research labs and any nongovernmental
institutions that received funding from any PHS agency. The PHS policy
includes a number of key elements, one of which is an assurance obtained
from research institutions stating that they are committed to following the
PHS policy and the Guide for the Care and Use of Laboratory Animals.
The Guide for the Care and Use of Laboratory Animals, often referred to
simply as the Guide, is an important document for scientists and animal
care personnel. While previous versions of the Guide were supported solely
by the NIH and published by the Government Printing Office, the 1996
edition received support from the NIH, the U.S. Department of Agricul-
ture, and the U.S. Department of Veterans Affairs. The 8th edition, pub-
lished in 2010, was revised by an ad hoc committee of the Institute of
Laboratory Animal Research of the National Research Council and pub-
lished by the National Academies Press. (The National Research Council
is the operational arm of the nongovernmental National Academy of Sci-
ences.) The broader financial support of this new edition, as well as its
publication by the National Academies Press, gives some indication as to
how widely the Guide is used by the animal research community.
The Guide includes details on how animal research should be carried out
within an institution, including recommendations for animal program over-
sight, animal housing and environment, facilities management, and veteri-
nary care. Although the AWA itself does not address standards in regard to
rats and mice, the Guide does include these species. Additionally, the newest
edition of the Guide recognizes the increasing use of aquatic animals by in-
cluding recommendations for environment and housing of these species.
This edition emphasizes the notion of a comprehensive animal care and use
program based on a partnership between the Institutional Animal Care and
Use Committee (IACUC), the attending veterinarian, occupational health
and safety personnel, and investigators, all working collaboratively to ensure
animal welfare and safe working conditions for researchers. The AWA re-
quires that each research institution identify an attending veterinarian and
an IACUC, the two primary administrative components responsible for an-
imal welfare in research. The attending veterinarian is responsible for over-
seeing all aspects of animal care including husbandry and veterinary care.
The IACUC is responsible for evaluating the care, treatment, housing, and
use of animals, including approval of research protocols.
The Guide details a number of institutional policies that should be put
into place concerning issues such as the qualifications and training of the
184 Chapter 6
IACUCs
Both the AWA and the PHS policy mandate the establishment of an
IACUC, which oversees the animal care and use program for each institu-
tion. The AWA and the PHS policy differ somewhat in their minimal re-
quirements for the committee. The AWA requires a committee of at least
three people. The members of the committee are to possess “sufficient
ability to assess animal care, treatment, and practices in experimental re-
search . . . and shall represent society’s concerns regarding the welfare of
animal subjects.” At least one of the committee members is to be a doctor
of veterinary medicine (DVM) and one member is not to be affiliated with
the institution in any way (other than as a member of the IACUC). The
Use of Animals in Biomedical Experimentation 185
Table 6.2 Comparison of the AWA, PHS policy, and the Guide in their requirements for IACUC
Requirement AWA PHS policy The Guide
IACUC mandated Yes Yes Yes
Minimum number 3 5 Not specified
of members (but minimum of 3 because
of special requirements)
Special requirements • 1 DVM • 1 DVM • 1 DVM
for members • 1 nonaffiliated • 1 practicing scientist • 1 practicing scientist
• 1 nonscientist • 1 nonaffiliated,
• 1 nonaffiliated non-animal researcher
Applies to rodent use No Yes, through reference Yes
to the Guide
Another important element of the AWA and the PHS policy is the re-
quirement that the institution provide training for those staff members in-
volved in the care and/or research use of animals. This training is to include
a discussion of humane methods of animal care and experimentation, tech-
niques available to minimize the use of animals and animal distress, the
proper use of anesthetics and analgesics, methods by which deficient animal
care procedures may be reported, and how to use available services to learn
more about appropriate animal care and alternatives to animal techniques.
The National Research Council has prepared a book to assist in the devel-
opment of such institutional programs, Education and Training in the Care
and Use of Laboratory Animals: A Guide for Developing Institutional Programs
(1991). In addition, several online training options exist.
The AWA has been amended several times in recent years. Most often
this has happened through congressional legislation, but periodically it has
occurred through judicial action as some animal welfare or animal rights
organizations have attempted to alter the scope and specifics of the act.
Because the AWA covers both research and nonresearch activities involv-
ing animals, not all of the updates are relevant to institutions utilizing re-
search animals. Most recently, in December 2012, a final rule was passed
requiring U.S. Department of Agriculture-registered facilities to maintain
an emergency response plan and train animal care staff on how to imple-
ment the plan. This requirement was implemented following several natu-
ral disasters that resulted in significant losses of animals at research and
other registered animal facilities.
Given the current legal climate, it is impossible for a textbook to pre
sent a current assessment of the laws regulating the care and use of labora-
tory animals. The AWA has been amended in the past, and it is certain to
be modified again in the future, whether by legislation or lawsuit. For cur-
rent information, scientists will have to depend on the division of animal
care within their own research institutions. Without doubt, the relation-
ship between animal care professionals and scientists will continue to grow
in importance.
Beyond legislation
While laws define the minimum requirements scientists must follow in
their care and use of animals, most scientists will want to strive for levels of
care that exceed these minimums. The scientist’s primary ally in this goal is
the institution’s division of animal care or equivalent body. The veterinari-
ans and animal care professionals employed by this department serve as a
powerful resource to scientists. Using their knowledge can lead to both
better animal care and better science.
In most instances, it will be these professionals who provide the training
that is now mandated by law for those who are going to use animals in
190 Chapter 6
their research. New graduate students should be sure that they attend
these training sessions as early as possible. Traditionally, the training in
animal procedures for new graduate students has taken place within the
laboratory of their chosen advisor. However, animal care professionals are
better able to provide a comprehensive training experience than ad hoc
methods that may be in place in laboratories. In addition to this formal
training experience, students should realize that their institution’s animal
care professionals could also be an invaluable resource when they are seek-
ing to learn a new procedure or technique. In addition to being able to
advise students as to what the law requires when, for example, performing
rodent surgery, they will also be able to advise them on the appropriate
surgical techniques, use of anesthetics, and postoperative care. This advice
can ensure both that the animal does not suffer any unnecessary pain or
distress and that the students obtain the best data possible from their ex-
perimental efforts.
Although it is the legal responsibility of the faculty advisor (principal
investigator) to submit protocols to the IACUC, students would be well
advised to look at the protocols under which they are conducting their re-
search. Laboratory techniques often drift over time as personnel and expe-
rience change. Graduate students are likely to be in a better position than
their advisors to see this happening and realize that it is time to submit an
amended protocol to the IACUC. Additionally, scientists are required to
consider the use of nonanimal alternative techniques before resorting to
the use of animals for any procedure likely to cause pain or distress. Senior
graduate and postdoctoral students are often on the cutting edge of tech-
nology and thus in an excellent position to make suggestions to their advi-
sor for improving laboratory procedures.
In 1959, William Russell and Rex Burch enumerated three principles
that should act as a guide for the humane use of animals in research.
These are commonly referred to as the 3 R’s: replacement, reduction, and
refinement.
• Replacement refers to the attempt to substitute insentient materials or,
if this is not possible, a lower species that might be less susceptible to
pain and distress than a higher species. Why sacrifice the life of a
monkey for an experiment in which a dog would suffice? Why use a
dog where a mouse would do? Why use a mouse if the research ques-
tion could be answered using a cell culture?
The issue of replacement as it pertains to the involvement of
chimpanzees in research has garnered recent attention. In 2011, at
the request of the NIH, the Institute of Medicine and the National
Research Council completed an evaluation of the scientific necessity
of using chimpanzees in NIH-supported research. The committee
Use of Animals in Biomedical Experimentation 191
A Continuum of Realities
Francione has also challenged the “general view” that scientific inquiry
is protected under the First Amendment to the United States Constitu-
tion. Francione’s view is that the First Amendment provides very little pro-
tection for the conduct of scientific research although, somewhat
194 Chapter 6
It may be the case, however, that the federal government will, at some point,
try to impose on all experimentation a risk/benefit regulatory structure. . . .
Moreover, it is likely that even though experimenters find themselves with
the federal (or other) funds to do an experiment, state and local governments
may seek to restrict or even to prohibit such experimentation.
Figure 6.1 Images depicting the impact of anti-animal use activism. (Left) In
North America, the automobile of a university scientist who uses animals in re-
search is firebombed. Courtesy of J. David Dentsch. Used with permission. (Right)
In Europe, construction of a laboratory dedicated to animal research was sus-
pended for over a year due to threats against construction workers and staff by
animal rights protesters. Ultimately, security measures including a barrier wall
were used to establish an exclusion zone around the site to allow construction to be
safely completed. Courtesy of R. Wayne Barbee.
doi:10.1128/9781555818487.ch6.f6.1
196 Chapter 6
Conclusion
Written in the late 1940s, the Nuremberg Code listed 10 principles that
strongly influenced the ethical and legal foundation of biomedical research
using human subjects (see chapter 5). The use of animals in research was
validated in the third principle of the Code, which states: “The experiment
should be so designed and based on the results of animal experimentation
and a knowledge of the natural history of the disease or other problem
under study that the anticipated results will justify the performance of the
experiment.” Since that time, the use of animals in biomedical and behav-
ioral research has played a crucial role in understanding biological systems
and in translating basic research discoveries into products that benefit hu-
mans and animals alike. The use of animals in research is governed by laws
that must be carefully followed. Institutional processes that approve and
authorize animal use are derived from federal law in the United States and
other countries. Principal investigators are ethically bound to ensure that
all trainees and staff who work with animals are properly educated and
monitored for compliance with applicable codes and policies. In particular,
compliance with the relevant IACUC-approved protocol is imperative.
The IACUC-based protocol review system depends heavily on the volun-
tary participation of institutional scientists. Service on the IACUC rep-
resents good citizenship in support of the institutional research enterprise,
Use of Animals in Biomedical Experimentation 197
Discussion Questions
Case Studies
6.1 You are beginning a new postdoctoral position at the same time that
your mentor is moving her laboratory into a new building. She is
obsessive about animal care and wants to ensure that the colony of animals
to be established in the new facility is healthy. You are assigned the task of
developing a system of “sentinel” animals to monitor the health status of all
new incoming shipments of animals as well those in the established animal
198 Chapter 6
colony. You establish a system that involves the euthanizing of selected ani-
mals on a regular basis and screening for the presence of specific pathogens
by a contract laboratory. Because these animals are not being used for re-
search, do you have to submit a protocol to the IACUC to cover these activ-
ities? What policies or codes form the basis for your answer?
6.2 Dr. Sheldon Speigel is the director of the division of animal re-
sources at Coastal Medical College. Over the past few months, he
has received several complaints from principal investigators raising issues
about the care of their animals. To date, he has categorized these as “petty
violations,” but a couple of the complaints filed within the last week, if
based in fact, could have serious repercussions leading to the suspension of
animal research at the college. These complaints have come directly to
him, and he has not shared them with any of his staff, intending to investi-
gate these situations himself. In discussions with some of his staff, Dr.
Spiegel learns that his newest animal technician, Janie Halpin, has been
spending an inordinate amount of time consulting with researchers using
the facility. This was brought up because Janie’s preoccupation with the
investigators is interfering with her assigned duties as animal caretaker.
Another colleague tells Dr. Spiegel he saw Janie using her cell phone to
photograph one of the animal rooms a few days ago. He looks at her job
application and finds that she has a degree in information technology and
worked briefly in a veterinarian’s office before joining his staff. Dr. Spiegel
is uncomfortable with the situation and mentions these events to the med-
ical school’s legal counsel, Martha Moreno. A few days later, Martha calls
Dr. Speigel and says she took the liberty of doing a news service search.
She has found Janie’s name repeatedly associated with the activities of an
international animal rights organization. Martha proposes that Janie is
working “undercover” for this organization in hopes of exposing animal
mistreatment in medical research. What should Dr. Spiegel do now?
6.3 You are a graduate student in behavioral pharmacology, and your lab
is conducting a drug discrimination study, an operant procedure in
which rats are trained to identify drugs with stimulus properties similar to
those of a training drug. The primary goal of the present study is to test sev-
eral experimental compounds for their similarity to clozapine, an important
treatment for schizophrenia. The compounds to be tested have been sent to
your advisor as part of a contract awarded from a drug company. The gener-
alization testing portion of the study is nearing completion, with only one
dose-response curve left to obtain. During routine feeding, you notice that 8
of the 10 animals in the study have developed tumor-like growths at the site
of injection on the stomach. Additionally, these animals have begun losing
weight. Finally, you note that the animals do not exhibit any behaviors sug-
Use of Animals in Biomedical Experimentation 199
gesting that they are experiencing any discomfort. Concerned, you mention
the growths and weight loss to your advisor, who instructs you to continue
with generalization testing. He is concerned that having to train a new set of
animals in order to test one drug would waste large amounts of research
time and resources and may cause problems in interpreting the results. He
further states that the animals will be euthanized as soon as the testing phase
of the study is completed in less than a month and that the animals will be
fine until then. Is your advisor’s suggested course of action legally and ethi-
cally appropriate? If not, what should be done in this case? What are your
obligations in this situation?
opinion” about what she might do. She firmly believes there must be other
options for solving this without jeopardizing her training career in Dr.
Zogby’s lab. What advice or guidance do you have for her?
6.5 You are the head of the legal office at a large state-supported uni-
versity. The university has received a Freedom of Information Act
(FOIA) request for the names of the individuals serving on the IACUC.
The requestor is a science writer for a local newspaper. Your state has a
broad-reaching FOIA law, but requests for information can be denied if
appropriately justified. The university’s unwritten policy has been to hold
the IACUC roster in confidence owing to threats and acts of violence to-
ward animal research activities and researchers in this country and abroad.
At a staff meeting, one of your lawyers argues that the request be denied
for these very reasons. But two other members of your legal staff recom-
mend releasing the roster. They argue that most of the animal research at
the university is supported by public funds and therefore the roster should
be considered public information. One of them further argues that if the
request is denied, the newspaper will “go public” with its failure to get the
list and this will create negative publicity, perhaps leading to a costly legal
fight. Further, both of these staff members say that failing to honor the
request will appear as though the university has “something to hide.” The
university president is pressing for your recommendation. Do you advise
her to honor the FOIA request and release the names of the IACUC mem-
bers to the reporter? Provide the rationale for your recommendation.
6.6 You are invited as a guest faculty member to judge a local high
school science fair. One entry you judge is entitled “Alcohol Addic-
tion in Mice.” The student has purchased six mice from a local pet store.
One group of three of these mice has been caged and fed standard mouse
chow and given drinking water ad libitum. The other group is fed mouse
chow but is allowed water only once per day. This group of mice is instead
given unlimited access to 20% ethyl alcohol. After 6 weeks, the student
notes a significant weight loss in the latter group of mice as compared with
the control animals. He also notes abdominal distention and states that the
alcohol-fed mice ate significantly less food throughout the study. He con-
cludes that the alcohol mixture depressed the animals’ appetites. At the
end of the study, he destroys the animals by cervical dislocation. You con-
sult the school guidelines regarding the use of animals in science projects.
The guidelines state that the use of animals in science projects is discour-
aged. However, animals may be used with permission of the science
teacher. In this case, the student has sought and received such permission
for his project. What comments, if any, will you offer to the student about
his use of animals? Likewise, what, if anything, will you say to his teacher?
Use of Animals in Biomedical Experimentation 201
6.7 Dr. Jasmine Tanaka and Dr. Ellen Schwartz, professors in a neuro-
sciences department, both work on age-related neurodegenerative
diseases using rodent models. Their work sometimes puts them in direct
competition, and this creates intradepartmental tension that they typically
handle in a civil and professional fashion. Presently, each has a single NIH
grant, and both grants will have to be competitively renewed within the
next 6 months. Dr. Tanaka and her two postdocs are spending a week
learning a new technique in a research institute overseas. The remaining
members in Dr. Tanaka’s lab, an undergraduate student and a histology
technician, do not work with animals. Thus, prior to her departure, Dr.
Tanaka asked Dr. Schwartz to check a cohort of her rats every other day
during her absence. Dr. Schwarz gladly accepts this responsibility, seizing
the opportunity to be collegial. The five animals to be monitored are part
of an experiment that had been underway for 2 years. As per the protocol,
at 2.5 years of age, the animals are to be anesthetized, perfused so as to fix
brain tissue, and sacrificed, and brain tissue is to be recovered for structural
and histochemical studies. On her third visit to the vivarium to check on
the rats, Dr. Schwartz is confronted with a disconcerting situation. She
finds one of the rats dead in its cage. Two of the remaining four rats appear
gravely ill and, in Dr. Schwartz’s view, close to death. She surmises that if
they die, which would preclude the recovery of the fixed brain tissue, the
remaining two rats are not likely to be a large enough sample size to pro-
vide meaningful data. She immediately formulates a plan to recover useful
tissue from the two dying rats. She will anesthetize them with isoflurane
using an apparatus she has in her own lab. She is trained to do the fixative
perfusion and surgery to recover the rats’ brains, thus saving the needed
tissue from these valuable animals. She will then step up her monitoring of
the remaining two animals to three times a day until Dr. Tanaka returns. If
either of the remaining two animals becomes ill, she will repeat the brain
tissue recovery plan with them. As she mentally reviews her plan, she has
some hesitation because her actions likely fall outside of Dr. Tanaka’s ap-
proved protocol (and she is not listed as an investigator on the protocol).
It’s the weekend, and she contemplates contacting the veterinarian on call
to run her plan by him and seek his approval. But she worries that he may
forbid her to carry it out and order that the suffering animals be eutha-
nized. That would clearly compromise Dr. Tanaka’s long-term experiment,
which would take more than 2 years to repeat. She wonders if she should
risk the possibility that the veterinarian will effectively shut down the ex-
periment. On the other hand, if she preemptively carries out her plan and
it does succeed, she may find herself in deep trouble with the IACUC and
even face sanctions. In addition, looming in the back of her mind is the
notion that if the animals are lost under any circumstances it may look to
Dr. Tanaka like she passively sabotaged the experiments by inappropriate
202 Chapter 6
6.9 Dr. Carley Featherstone is disappointed that the IACUC has re-
jected her research protocol because it involves the mouse ascites
method of monoclonal antibody production. She appeals to the IACUC,
citing her long use of this practice, prior approval to use the method at her
previous institution in another state, and the loss of time that an immedi-
ate switch to in vitro methods would entail. She asks for permission to
continue using the ascites method for 3 years while she phases in the in
vitro production methods. The IACUC denies the appeal. She then resub-
mits the protocol, reporting that since she has found a commercial source
for the monoclonal antibody she no longer needs to produce it herself.
The protocol is quickly approved. Dr. Emanuel Louis, a member of the
IACUC, has a conversation with Dr. Featherstone a few months later. She
tells him that her commercial source is a custom contract lab that she has
engaged to produce the antibody using her cell lines and to her specifica-
tions (i.e., using the mouse ascites method). Is Dr. Featherstone’s solution
legal? Is it ethical? Why or why not? Dr. Louis comes to you for advice.
Does he have any obligation to report this information to the IACUC?
6.10 You are a graduate student working on a project that involves ad-
ministering nerve toxins directly into the cerebrospinal fluid of
rats by using a special infuser connected to tubing that you have surgi-
cally implanted into the base of each rat’s skull. Administering different
Use of Animals in Biomedical Experimentation 203
nerve toxins to block specific effects of different types of drugs will help
determine how the drugs work. After surgery, the nerve toxin is given,
and a few days later the investigational drug is given to determine whether
it will have an effect. This protocol has been approved by the IACUC and
is being funded by a grant from the Department of Defense. Over the
past few weeks, you have carefully implanted a catheter into the base of
each rat’s skull and then infused the specified amount of nerve toxin.
When you go to the vivarium to take the rats to the lab to administer the
investigational drugs, you find that a number of the rats are paralyzed or
dead. You did not expect this. The lab director is currently out of town, so
you go to the lab’s senior graduate student, Tom, for advice. Tom will be
able to complete his dissertation writing when this experiment is done,
and he has made it clear that he wants this experiment to run without
delay. You ask him whether you should stop the experiment to determine
why some of the rats are dead or paralyzed. He responds that stopping
the experiment now would waste several weeks of work and delay com-
pletion of his dissertation. Stopping now may mean having to start over
later and could result in using even more rats. He further explains that
the IACUC might even prohibit restarting the experiment, so the rats
would have died for nothing because the data would have to be obtained
another way. He suggests that the paralysis and death of some of the rats
may be due to your inadequate experience in performing rat surgery or
infusions, so your gaining further practice by continuing this experiment
may result in better outcomes for the rest of the rats on which you per-
form surgery. What do you do now? Do you continue performing sur-
gery and infusions on the rats, knowing that more rats may be harmed?
Do you stop the experiment and inform the IACUC, which risks earning
the disfavor of Tom, with whom you have to work? How would you ex-
plain each course of action to the IACUC?
Resources
Print
Anonymous. 1966. Concentration camps for dogs. Life 60(5), February 4, p 22–29.
Carruthers P. 1992. The Animals Issue: Moral Theory in Practice. Cambridge Uni-
versity Press, Cambridge, United Kingdom.
Cohen C. 1986. The case for the use of animals in biomedical research. N Engl J
Med 315:865–870.
Francione GL. 1987. Experimentation and the marketplace theory of the First
Amendment. Univ Penn Law Rev 136:417–512.
Francione GL. 1988. The constitutional status of restrictions on experiments in-
volving nonhuman animals: a comment on Professor Dresser’s analysis. Rutgers
Law Rev 40:797–818.
204 Chapter 6
Francione GL. 1990. Xenografts and animal rights. Transplant Proc 22:1044–1046.
Frey RG. 1980. Interests and Rights: The Case against Animals. Oxford Clarendon
Press, Oxford, United Kingdom.
Frey RG. 1983. Rights, Killing, and Suffering: Moral Vegetarianism and Applied Ethics.
Blackwell Publishing, Oxford, United Kingdom.
Frey RG. 1989. The case against animal rights, p 115–118. In Regan T, Singer P
(ed), Animal Rights and Human Obligations, 2nd ed. Prentice-Hall, Inc, Engle-
wood Cliffs, NJ.
Frey RG, Paton W. 1989. Vivisection, morals, and medicine: an exchange, p 223–
236. In Regan T, Singer P (ed), Animal Rights and Human Obligations, 2nd ed.
Prentice-Hall, Inc, Englewood Cliffs, NJ.
Herzog HA. 1988. The moral status of mice. Am Psychologist 43:473–474.
Institute of Medicine. 2011. Chimpanzees in Biomedical and Behavioral Research:
Assessing the Necessity. National Academies Press, Washington, DC. http://books
.nap.edu/openbook.php?record_id=13257.
Jamison WV, Lunch WM. 1992. Rights of animals, perceptions of science, and
political activism: profile of American animal rights activists. Sci Technol Hum
Values 17:438–458.
Leahy MPT. 1991. Against Liberation: Putting Animals in Perspective. Routledge,
New York, NY.
Midgley M. 1989. The case for restricting research using animals, p 216–222. In
Regan T, Singer P (ed), Animal Rights and Human Obligations, 2nd ed. Prentice-
Hall, Inc, Englewood Cliffs, NJ.
Midgley M. 1992. The significance of species, p 121–136. In Hargrove EC (ed),
The Animal Rights/Environmental Ethics Debate: The Environmental Perspective.
State University of New York Press, Albany, NY.
National Research Council. 1991. Education and Training in the Care and Use of
Laboratory Animals: A Guide for Developing Institutional Programs. National
Academy Press, Washington, DC. http://www.nap.edu/openbook.php?isbn
=0309043824.
National Research Council. 2010. Guide for the Care and Use of Laboratory Ani-
mals, 8th ed. National Academies Press, Washington, DC. http://www.nap.edu
/catalog.php?record_id=12910.
Nature. 2011. Special issue: Animal Research: Anatomy of a Conflict. 470:187–
197. http://www.nature.com/news/specials/animalresearch/index.html.
Office for Protection from Research Risks. 1986. Public Health Service Policy on
the Humane Care and Use of Laboratory Animals. Office for Protection from Re-
search Risks, National Institutes of Health, Bethesda, MD.
Post SG. 1993. The emergence of species impartiality: a medical critique of bio-
centrism. Perspect Biol Med 36:289–300.
Regan T. 1983. The Case for Animal Rights. University of California Press, Berkeley,
CA.
Regan T. 1985. The case for animal rights, p 13–26. In Singer P (ed), In Defence of
Animals. Basil Blackwell, Inc, Oxford, United Kingdom.
Russell WMS, Burch RL. 1959. Principles of Humane Animal Experimentation.
Charles C Thomas, Springfield, IL.
Use of Animals in Biomedical Experimentation 205
Seok J, Warren HS, Cuenca AG, Mindrinos MN, Baker HV, Xu W, Richards
DR, McDonald-Smith GP, Gao H, Hennessy L, Finnerty CC, López
CM, Honari S, Moore EE, Minei JP, Cuschieri J, Bankey PE, Johnson JL,
Sperry J, Nathens AB, Billiar TR, West MA, Jeschke MG, Klein MB,
Gamelli RL, Gibran NS, Brownstein BH, Miller-Graziano C, Calvano
SE, Mason PH, Cobb JP, Rahme LG, Lowry SF, Maier RV, Moldawer LL,
Herndon DN, Davis RW, Xiao W, Tompkins RG; Inflammation and Host
Response to Injury, Large Scale Collaborative Research Program. 2013.
Genomic responses in mouse models poorly mimic human inflammatory
diseases. Proc Natl Acad Sci USA 110:3507–3512. http://www.pnas.org
/content/110/9/3507.full#aff-2.
Singer P. 1990. Animal Liberation, 2nd ed. Avon Books, New York, NY.
Online
Policies and laws
The Public Health Service Policy on the Humane Care and Use of Laboratory
Animals can be found on the National Institutes of Health (NIH) Office of
Laboratory Animal Welfare (OLAW) website (2002 reprint):
http://grants.nih.gov/grants/olaw/references/phspol.htm
The Health Research Extension Act of 1985, Public Law 99-158 (Animals
in Research), is on the NIH OLAW website:
http://grants.nih.gov/grants/olaw/references/hrea1985.htm
Guidelines
Guide for the Care and Use of Laboratory Animals, 8th ed (2010), is available
on the National Academies Press website (online as a free downloadable
PDF) at
http://www.nap.edu/catalog.php?record_id=12910
One free copy of the Guide for the Care and Use of Laboratory Animals, as well
as information about foreign language translations, is available on the web-
site of the National Academy’s Institute for Laboratory Animal Research:
http://dels.nas.edu/ilar
206 Chapter 6
Guidelines for the Care and Use of Mammals in Neuroscience and Behavioral
Research was published in 2003 as an expansion of the Guide for the Care and
Use of Laboratory Animals. This book specifically covers the use of mammals
in neuroscience and behavioral experiments.
http://www.nap.edu/catalog.php?record_id=10732
Bioethics
Bioethics resources on the Web (compiled by the NIH):
http://www.nih.gov/sigs/bioethics/
People for the Ethical Treatment of Animals (PETA) is the archetype for
animals rights groups in the United States.
http://www.peta.org/
Appendix material
Appendix IV of this book contains the text of an animal subjects protocol.
chapter 7
Introduction
Scientific Integrity: Text and Cases in Responsible Conduct of Research, 4th ed.
by Francis L. Macrina
© 2014 ASM Press, Washington, DC
doi:10.1128/9781555818487.ch7
209
210 Chapter 7
Conflict of Effort
Members of the scientific community enter into research settings with de-
fined expectations. A trainee expects to receive instruction, counseling, and
guidance. A supervisor who has many obligations may not provide ade-
quate direction as measured by the amount of time or quality of advising of
the trainee. Faculty members are called upon to serve on institutional, pro-
fessional, and civic committees; they also strive to excel in their scientific
scholarship by writing papers and grant applications and presenting out-
side seminars and lectures; and they have assigned duties in teaching and
administration. Unscheduled responsibilities such as mentoring research
trainees often suffer in the face of multiple demands on faculty time. Train-
ees, too, are subject to multiple demands on their time; formal course
work, examinations, financial obligations, and interpersonal relationships
compete with time spent designing, conducting, and analyzing scientific
studies. Perhaps the most stressful conflicts of commitment for trainees
relate to financial pressures and personal responsibilities.
Conflict of effort is distinctly different from conflict of interest, al-
though the same set of external circumstances may precipitate both dilem-
mas. A conflict of effort arises when demands made by parties other than
the primary employer interfere with the performance of the employee’s
assigned duties in teaching, research, and service. In general, scientists are
expected to notify their supervisor of outside responsibilities, to seek per-
mission in advance in most instances, and to report annually on outside
professional activities, whether paid or not. Scientists with successful re-
search programs are asked to present seminars and lectures at other insti-
tutions, at conferences, and at meetings. They are also asked to serve on
editorial boards, research advisory panels, and policy advisory boards.
They may be asked to teach in short courses and to offer methods
214 Chapter 7
interests of their private companies rather than toward the needs of the
primary employer. In addition, the faculty member may meet scheduled
assignments but arrive inadequately prepared. The faculty member may be
inattentive to his or her advisory roles for students, staff, and research
trainees. The immediate supervisor has the responsibility to counsel the
faculty member about his or her concerns. After mutual agreement, if pos-
sible, on the extent of the outside commitments, a date for a follow-up re-
view should be set. If the faculty member and the immediate supervisor
cannot reach a mutual accord, the matter may have to be considered by a
grievance or disciplinary process.
Most conflicts of effort arise from the enthusiastic aspirations of scien-
tists to gain acceptance from their peers and to achieve national and in-
ternational stature as investigators, rather than secondary to financial
conflicts of interest. Universities in particular send mixed messages to
young faculty, placing a premium on professional recognition. Faculty
members usually respond well to discussion on the expected balance of
effort among teaching, research, and service. It is too much to expect
young scientists to find the proper balance without role models, mentors,
and guidance.
Scientists who receive a portion of their salary from federal research
grants or contracts find it difficult to accept that effort is defined in terms
of the fraction of time devoted to the sponsored project, with the denomi-
nator being the total time spent in professional pursuits and not time in
hours or days. Scientists typically devote 60 hours per week to their profes-
sional development, including service to advisory bodies, participation in
professional organizations, and outside lectures. Auditors of effort reports
require that an activity be assigned to only one category and do not recog-
nize that mentoring and research can occur simultaneously. Accordingly,
25% effort on a project for a scientist devoting 60 hours per week to all
professional endeavors computes, in the mind of a federal auditor, to 15
hours per week devoted to the project. Scientists face the dilemma of dif-
ferentiating between their assigned institutional responsibilities and com-
pensated effort and their total effort, which includes activities for personal
satisfaction and achievement.
Conflict of Conscience
Conflict of Interest
Orientation
Basic research workers have a tradition of free inquiry and free exchange of
ideas, united in a shared purpose to create knowledge, to critique existing
knowledge, and to disseminate knowledge. The image of the eccentric sci-
entist lacking worldly aspirations and living in a cloistered ivory tower has
given away to that of a greedy entrepreneur, insensitive to the public good.
Science and science administrators have promised, and the public has
come to expect, products of research and technology that improve the
quality of life and spur economic growth. The public has called upon sci-
entists to discover means to prevent or cure cancer, diabetes, heart disease,
mental illness, aging, and moribund obesity and lavishes great rewards
upon those who appear to achieve these goals. It is a small wonder then
that some scientists have lost their innocence and fallen afoul of matters
related to conflicts of interest.
Definitions
“Conflict of interest” or “financial conflict of interest” is a legal term that
encompasses a wide spectrum of behaviors or actions involving personal
gain or financial interest. The definition of conflict of interest, including
the scope of persons subject to the provisions in a code or set of rules and
regulations, varies according to state and federal statutes, case law, con-
tracts of employment, professional standards of conduct, and agreements
between affected parties or corporations or both. A conflict of interest ex-
ists when an individual exploits, or appears to exploit, his or her position
for personal gain or for the profit of a member of his or her immediate
family or household. The identification of members of the immediate fam-
ily and household is in a state of flux, but these individuals include the
218 Chapter 7
spouse and minor children living at home. Case law is evolving with re-
spect to dependent parents, adult children living at home, and “significant
others.” Another critical component of conflict of interest pertains to the
undue use of a position or exercise of power to influence a decision for
personal gain. Many conflict-of-interest codes also prohibit activities that
create an appearance of a conflict of interest. Full disclosure may be the
only means to combat perceptions of undue influence.
For researchers, the federal policies on conflicts of interest that have the
broadest reach are those of the National Science Foundation and the U.S.
Department of Health and Human Services. The latter policy applies to
research scientists and institutions receiving funds from agencies of the
Public Health Service (PHS), including the National Institutes of Health
(NIH), the world’s largest grant funding agency. The PHS policy, published
under the moniker of “Promoting Objectivity in Research,” was signifi-
cantly revised and reissued in the 2011 Federal Final Rule on Conflict of
Interest. This policy requires researchers to disclose all significant financial
interests. The threshold for a significant financial interest is $5,000 and en-
compasses all institutional responsibilities, not just those related to a feder-
ally funded project. The institution must report to the NIH the name of the
investigator with a conflict of interest and how it is managed, the name of
the entity, the nature of the conflict, its dollar value, how the conflict relates
to sponsored research, and the basis on which the institution determined
that there is a conflict. The information collected on significant financial
interests must be publicly accessible on a website or by a written response to
a request within 5 days. Each PHS investigator must complete training ev-
ery 4 years, and the institution must conduct a retrospective review of non-
compliance events and submit a report to the PHS awarding unit.
Conflict of interest is distinctly different from conflict of effort and
conflict of conscience. Conflict of interest is also distinctly different from
bias in research, which is the inability or unwillingness to consider alterna-
tive approaches or interpretations on their merits. Scientists sometimes
develop strong preferences for particular research techniques or become
deeply vested in a particular working model to the exclusion of alternative
explanations. The origin of these prejudices may be subconscious, or at
least unrecognized, reflecting past training, cultural background, experi-
ence, or group dynamics. Legislative bodies, governing boards, and the
public have tended to define and specify penalties for conflict of interest in
science by a unitary code. There is little recognition of a hierarchy of in-
jury to the public well-being. Clearly, the public is harmed to a far greater
extent when a conflict of interest is allowed to influence a clinical decision
to market a drug for human use than when it is allowed to influence the
decision to purchase an item of laboratory equipment from a particular
vendor or to hire a relative to work in the laboratory of a scientist.
Competing Interests in Research 219
Compensation
Academic scientists are employed by their institutions to teach, to carry
out research, and to render service to the institution, the surrounding
community, and the profession. The relative effort in each activity varies
according to the mission of the institution and according to strategies to
effectively utilize the talents of the faculty. Faculty members who are ac-
tively engaged in research have the opportunity to present their results to
colleagues, including those who are employed by for-profit corporations.
In general, universities encourage faculty members to present seminars
and lectures at other research centers and condone payment of speaker’s
fees and full reimbursement of travel expenses. Scientists whose research
bears upon commercial application of a product may be invited to confer-
ences targeting groups that influence purchasing decisions. A scientist
studying the mechanism of action of an antibiotic may be invited to partic-
ipate in a conference sponsored by the pharmaceutical company distribut-
ing the antibiotic, targeted to physicians who will prescribe the drug. The
scientist may be paid a generous speaker’s fee or honorarium and provided
luxury travel and lodging accommodations. There is a broad spectrum of
speaker’s fees, honoraria, and travel accommodations, some of which have
attracted the attention of the Internal Revenue Service as well as the pub-
lic. Honoraria and speaker’s fees above a modest level are increasingly
222 Chapter 7
Courseware
Scientists have the opportunity, even the responsibility, to disseminate in-
formation. Quite often, this dissemination of information takes the form of
instructional material: textbooks, computer programs, Web pages, and
video media. The copyright on scholarly scientific works traditionally has
been retained by the creator until assigned to a publisher or distributor
(see chapter 9). There are advocates arguing that authors of technical man-
uscripts ought to retain the copyright on their articles and provide the
publisher with a limited license to produce, distribute, and archive the
work. There is no trend to alter the practice of creators’ retaining the
copyright on creative works unrelated to job assignments. Some educa-
tional institutions, however, hold that instructional materials, especially
those in electronic format, are generated as assigned work with consider-
able investment of resources by the employer. Courseware and sophisti-
cated management software potentially have substantial commercial value.
Friction between creators and employers about distribution of revenue
from the sale or licensing of electronic scholarly materials is not rare, and
many research universities have recently revised their copyright policies to
provide for revenue sharing. There is considerable variation among insti-
tutions in the policies developed. The issues addressed in these policy
statements include (i) the extent to which the current employer may con-
tinue to use and share revenue from copyrighted instructional material af-
ter the creator leaves the institution or takes another assignment within
the institution; (ii) the rights of the creator to use, sell, or license copy-
righted instructional material, particularly to a competing organization;
(iii) the rights of creators to restrict use of their voice and their personal
images in electronic courseware; and (iv) the rights of the employer to as-
sign other employees to modify, edit, and update electronic courseware.
During this period of rapidly evolving practices, the employee-creator is
advised to develop a memorandum of understanding with the supervisor
and the employer’s intellectual property officer.
Nepotism
Most state and federal agencies are subject to statutes or have rules that
preclude a scientist from hiring or supervising an immediate member of
his or her family or of the same household. These statutes are, in part,
rooted in strategies to ensure fair access to employment opportunities.
One of the most frequent nepotism practices is hiring high school-or
college-age progeny by an investigator, particularly for part-time and sum-
mer work. This practice is clearly contrary to equal access to employment
opportunities and career development for underrepresented groups. In ad-
dition, selection of immediate members of the family for employment con-
stitutes use of a position of authority for personal gain. The boundaries of
224 Chapter 7
Insider trading
Scientists conducting research sponsored by industry or who are engaged
in consulting usually have completed confidentiality agreements. The sci-
entist agrees to avoid discussing proprietary information in the presence of
unauthorized parties, including family members and friends. Proprietary
information includes, but is not limited to, the company’s future plans and
ideas, trade secrets, financial information, technical and research data, op-
erating strategies, internal business processes, and technologic improve-
ments that are not generally known to the public. In the course of
proprietary research or consultation, a scientist may become aware of in-
formation relating to the economic value of a product or potential prod-
uct. A toxicologist, for example, may be involved in a project in which a
serious adverse effect of a marketed drug is discovered, and this result will
jeopardize the continued approval of the drug. A chemical engineer who is
consulting for a drug manufacturer may learn that the last hurdle to large-
scale production and formulation of a new, much-needed drug has been
overcome. By virtue of the paid relationship between the scientist and the
company, the scientist is an “insider” and is restricted from using confiden-
tial information to personal advantage, that is, to sell stock of a company
whose drug faces liability suits or loss of market share or to buy stock of a
company on the verge of introducing a highly valued new drug.
Equity interests
Members of the academic scientific community are receiving conflicting
admonitions from government, employers, and the public. Scientists are
urged to accelerate the transfer of basic science knowledge into application
and commercialization. Advocacy groups in particular have expressed con-
cern that science is not sufficiently responsive to public need and that the
lag from laboratory discovery to application is too long. National, state,
and local governments and business communities have turned to research
as the means to maintain economic competitiveness. Scientists quickly
learn that most of their research discoveries with potential for commer-
cialization require substantial development before established industry is
willing to invest in university-generated intellectual property. Scientists
who are convinced of the market potential of their inventions soon find
that the patent process and product development are expensive and time-
consuming. In addition, most scientists lack experience in writing a busi-
ness plan and in securing venture capital. Quite often, the scientist will
enter into an entrepreneurial corporation as an equity owner. Scientists
inevitably feel that they are the most qualified to lead the technical devel-
opment of the invention. It is at this stage that concerns about conflict of
interest arise. In general, public institutions restrict the circumstances un-
der which scientist-entrepreneurs may receive grants or contracts through
their universities from a corporation in which they are in management
positions or equity owners or both. Private institutions usually have fewer
restrictions on faculty entrepreneurship than do public institutions. It is
imperative that faculty entrepreneurs disclose possible conflicts of interest
to their administration. Failure to do so, or the intentional withholding of
information about potential conflicts of interest, constitutes a violation of
the rules and procedures of most universities.
Universities, too, are being offered equity interest in entrepreneurial
ventures involving faculty members. A research institution that accepts an
equity position in a start-up company is likely to offer encouragement to
the scientist-entrepreneur at critical times. In addition, the investors are
not depleted of cash necessary for successful development and marketing
of the product. The ultimate return to the university from an equity hold-
ing has the potential to exceed the income from royalties and licensing
fees. University administrators, in such circumstances, find themselves
called upon to make decisions in which the interests of the venture corpo-
ration and those of the university faculty may not be identical. University
administrators may become unduly interested in the economic success of
the venture company, even at the expense of educational responsibilities of
230 Chapter 7
Institutional prerogatives
Universities have a strong sense of self-preservation or self-protection when
confronted with issues that are likely to have major adverse effects on them.
Universities are reluctant to cancel lucrative contracts when a faculty mem-
ber is found to have a serious conflict of interest. The reputation of a leading
research university is based on its extramural support and achievements that
attract positive public attention, such as patents, prizes received by faculty,
and scientific breakthroughs of general interest. Universities are doubly
threatened by scientific misconduct: there is the potential loss of grant fund-
ing and the loss of prestige. In addition, an investigation of scientific mis-
conduct is expensive. As a result, universities are not eager to invite
complaints of scientific misconduct or conflict of interest.
The bureaucrats within the university are reluctant to be drawn into pro-
ceedings pertaining to scientific misconduct or conflict of interest. Adminis-
trators are insecure about their mastery of the process, are fearful of political
repercussions within the institution when a distinguished scientist is the
Competing Interests in Research 231
subject of a complaint, and are anxious about criticism from news media that
frequently focuses on individuals rather than issues. Colleagues within the
university, too, are reluctant to become involved in deliberations about con-
flict of interest or scientific misconduct because it is perceived as taking
sides with the complainant or the alleged perpetrator. Scientists are also
aware of the potential financial damage to their institution and the negative
effect on the institution’s image and feel some need to protect their em-
ployer and to attenuate adverse effects of the allegation.
Some critics have charged that universities have failed to take the lead
in addressing scientific misconduct and conflict of interest. These allega-
tions have been reinforced by news media and some legislators who sug-
gest that universities are inept or even recalcitrant in assuming
responsibility for the behavior of the members of their community. Uni-
versities are particularly concerned about the increasing administrative re-
sponsibilities assigned to them by state and federal governments, because
many of these requirements are unfunded mandates and are perceived as
placing university administrators at odds with the attitudes and aspirations
of their own scientists. There is little doubt, however, that the public and
legislators are increasingly insisting that universities accept responsibility
for monitoring the integrity of the science carried out by their employees
and trainees, and for the personal interests of employees that may affect
the independence of decision making. Judgments on these complex issues
are best vested in those who understand the normative standards of the
discipline and the particular environment in which the conduct being ex-
amined occurs.
Conclusion
ences, and workshops will impair the ability of individuals to meet their
responsibilities to their employer, subordinates, trainees, and colleagues.
“Conflict of interest” is an umbrella term for a wide range of behaviors and
circumstances. Conflict of interest at some level involves the use of posi-
tion or authority for personal gain. Although most attention has been di-
rected toward personal financial gain by individuals, it is also true that
universities and other corporations may engage in practices that create a
conflict of interest between the organization and individuals, most often its
own employees, or with other corporations.
Some financial conflicts of interests are obvious. Others are not neces-
sarily obvious and are defined by regulations and statutes. Still others are
gauged by normative professional standards that vary with time or across
disciplines. Various arbitrary thresholds have been established in statutes,
institutional guidelines, and federal regulations that define the level of a
financial interest that creates a conflict of interest. Some laws may forbid
participating in activities or entering into contracts that create a conflict of
interest; for example, an employee of a state agency may not receive more
than $10,000 in compensation from an outside contractor doing business
with that agency. Most often, the individual is required to disclose a finan-
cial interest that may be perceived as creating a conflict of interest. A sym-
posium speaker receiving a consulting fee from a pharmaceutical company
is expected to disclose that arrangement to the organizers and audience as
a prerequisite to participation in a conference addressing the merits of the
company’s commercial products.
Scientific conflict of interest involves the use of position to influence de-
cisions on publication of manuscripts, funding of grant applications, and
formulation of regulations on the use or commercialization of a product.
There is no general agreement at this time on the circumstances that create
a scientific conflict of interest. With increased emphasis on commercializa-
tion of intellectual property generated by academic scientists, there is con-
cern about the effect of financial interest on the direction and interpretation
of research. Can a scientist who holds a patent on a pressure sensor impar-
tially compare the efficacy of that device to a competitor’s sensor when the
conclusions will affect royalty income? Will an advisor with substantial
funding from the private sector allow trainees the opportunity to explore
their own ideas that may not directly relate to the industrial project? Should
a scientist employed by a pharmaceutical company be appointed to the edi-
torial board of a journal that publishes articles on the efficacy of therapeutic
agents? Should a scientist review the grant application of a collaborator or a
competitor? Clearly, the definition of scientific conflict of interest cannot be
made so broad as to exclude from the evaluation process most individuals
knowledgeable in the field.
234 Chapter 7
Discussion Questions
Case Studies
7.4 Dr. Cecilia Jonas is on the editorial board of the leading chemical
engineering journal. Dr. Jonas receives a manuscript for review re-
porting results similar to those in her draft manuscript. Dr. Jonas is await-
ing replication of one experiment involving a novel method of polymer
separation in order to prepare a new figure with better-defined graphical
data. Although Dr. Jonas’s manuscript has content distinctly different from
the one received for review, she believes it is likely that the impact of her
publication will be greatly reduced by publication of the competing manu-
script. Dr. Jonas redirects her effort toward completion and submission of
her manuscript, setting aside the manuscript to be reviewed. Within 2
weeks, her well-prepared manuscript is submitted to another quality jour-
nal in the field of chemical engineering. Dr. Jonas then, over the next sev-
eral days, critically reviews the manuscript that she received; makes a
number of insightful suggestions, as she usually does; and returns the man-
uscript to the editor with the recommendation that the paper be accepted
after major revision. She also requests that the revised article be sent to her
for a final consideration on publication. What are the real or perceived
conflicts of interest confronting Dr. Jonas as a member of an editorial
board? Has she acted ethically and responsibly? If not, what do you think
she should she have done in this situation?
7.5 Yoon Kim is senior technician in the laboratory of Dr. Sun. Dr.
Sun’s laboratory is well funded and has several technicians, gradu-
ate students, and postdoctoral workers. The laboratory uses large amounts
Competing Interests in Research 237
$50,000 gift to her dean. This gift is used to provide three competitively
awarded research fellowships to graduate engineering students selected
annually by the dean. Moreover, the president of her university currently
sits on the corporate board of InterProbe, for which he receives a retainer
fee and corporate stock. His total compensation package amounts to
$150,000 over a 3-year period. Are there conflict-of-interest issues that
need to be addressed in the submission of Sally’s proposal? If so, what are
they? Are they manageable?
7.10 Dr. Marcella Prevot and Dr. Charles d’Andreas met and subse-
quently married while postdoctoral fellows. Marcella’s research fo-
cused on public health and epidemiology, whereas Charles’s research
focused on biostatistics and health outcomes. They were fortunate to both
be hired into the public health sciences department at Research University.
Each has been successful in obtaining extramural support for their re-
search, and both are effective teachers and have attracted graduate stu-
dents. They publish independently and attend different professional
meetings. Overall, the couple is well perceived in their department.
Charles’s career advances somewhat faster than Marcella’s, and Charles is
tenured after only 4 years at Research University. Later on the department
chair of the public health sciences department leaves Research University
unexpectedly and Charles is named interim chair. This is the year that
Marcella is being evaluated for a tenured position in her department. Pol-
icies at Research University, however, prohibit a spouse from supervising,
setting salary, or recommending promotion of a direct member of the fam-
ily. What are the professional and ethical reasons for nepotism rules, that
is, prohibitions on favoritism to family members? What options are avail-
able to Drs. Prevot and d’Andreas?
Resources
Print
Anderson MS, Steneck NH (ed). 2011. International Research Collaborations: Much
To Be Gained, Many Ways To Get in Trouble. Routledge, New York, NY.
Brockway LM, Furcht LT; FASEB. 2006. Conflicts of interest in biomedical
research—the FASEB guidelines. FASEB J 20:2435–2438. http://www.fasebj
.org/content/20/14/2435.full.pdf+html.
Bulger RE, Heitman E, Reiser SJ. 2002. The Ethical Dimensions of the Biological
and Health Sciences, 2nd ed. Cambridge University Press, Cambridge, United
Kingdom.
Campbell EG, Gruen RL, Mountford J, Miller LG, Cleary PD, Blumenthal
D. 2007. A national survey of physician-industry relationships. N Engl J Med
356:1742–1750.
Campbell EG, Weissman JS, Ehringhaus S, Rao SR, Moy B, Feibelmann S,
Goold SD. 2007. Institutional academic-industry relationships. JAMA 298:
1779–1786.
240 Chapter 7
Online
On the American Medical Association (AMA) website is the AMA’s Code
of Medical Ethics, listing guidelines including 8.03 (Conflicts of Interest:
Guidelines), 8.031 (Conflicts of Interest: Biomedical Research), 8.0315
(Managing Conflicts of Interest in the Conduct of Clinical Trials), and
8.061 (Gifts to Physicians from Industry):
http://www.ama-a ssn.org/ama/pub/physician-r esources/medical-e thics/code
-medical-ethics.page?
Department of Health and Human Services final rule (42 CFR 50, 42 CFR
94): Responsibility of Applicants for Promoting Objectivity in Research
for Which Public Health Service Funding Is Sought and Responsible
Prospective Contractors (Federal Register, Aug. 25, 2011, Vol. 76, No. 165,
p 53256–53293):
http://grants.nih.gov/grants/policy/coi/fcoi_final_rule.pdf
The National Institutes of Health and the U.S. Department of Health and
Human Services have developed the resources to help ensure transparency
regarding outside activities and proactive management of conflict- of-
interest issues:
http://www.nih.gov/about/ethics_COI.htm
The Supreme Court on June 6, 2011, ruled that the Bayh-Dole Act does
not automatically vest ownership of patent rights in universities when the
underlying research was federally funded. More information can be found
on IPWatchdog.com:
http://ipwatchdog.com/2011/06/06/supreme-c ourt-a ffirms-c afc-i n-s tanford-v
-roche-on-bayh-dole/id=17594/
This page intentionally left blank
chapter 8
Collaborative Research
L. Michelle Bennett and Francis L. Macrina
Overview • Drivers of Collaborative Research • A Case in Point
• Challenges of Collaborative Research • The Nature of
Collaboration • Collaborative Agreements and Institutional
Commitment • Fundamentals for Successful Team and
Collaboration Dynamics • Mentoring in the Era of Team Science
• Diversity • Authorship • Data Sharing, Custody, and Ownership
• Managing Conflict and Promoting Disagreement • Collaborations
with Industry • Collaboration with International Partners
• Conflict of Interest • Miscellanies • Conclusion • Discussion
Questions • Case Studies • Resources
Overview
Most of the work still to be done in science and the useful arts is precisely
that which needs knowledge and cooperation of many scientists . . . that is
why it is necessary for scientists and technologists to meet . . . even those in
branches of knowledge which seem to have least relation and connection
with one another.
Written by Antoine Lavoisier more than 200 years ago, these words reflect
a longstanding appreciation of the importance of collaborative research.
Today, the scale and complexity of biomedical research problems in-
creasingly demand that scientists move beyond the confines of their own
disciplines and explore new organizational models for team science. For
example, imaging research often requires radiologists, physicists, engi-
neers, cell biologists, and computer programmers to work together in inte-
grated teams. Although many scientists will continue to pursue individual
research projects, opportunities to get answers to difficult questions will
often be found in the pursuit of interdisciplinary research. Along with con-
tinued growth in specialized technology, this will drive the continued
growth of research collaboration in many fields.
Scientific Integrity: Text and Cases in Responsible Conduct of Research, 4th ed.
by Francis L. Macrina
© 2014 ASM Press, Washington, DC
doi:10.1128/9781555818487.ch8
243
244 Chapter 8
Advances made in the sciences today are rarely the result of the labors
of single investigators. Even the paradigm for the training of new scientists
is a collaboration, with the mentor and the trainee contributing individu-
ally to a working relationship that is expected to produce positive out-
comes for both. To be sure, significant scientific contributions do
sometimes emanate from the work of single individuals. Geneticist and
Nobel laureate Barbara McClintock was the sole author on over 90% of
her more than 70 scholarly publications. But historically, collaborative re-
search has played a dominant role in advancing our knowledge of the
world and contributing to the betterment of humankind. Today, the soli-
tary scientist—armed with the knowledge and tools of a single discipline—
seeking to conquer some devastating disease is largely a romantic myth.
Whether we are trying to unlock a fundamental secret of life or to turn
basic knowledge into a practical application, collaborative relationships
usually offer us the best chance of success.
A Case in Point
Examples of the power of collaboration are easy to find across many scien-
tific disciplines. The application of genomics in medical research has gen-
erated a trove of such examples, of which the discovery of the von
Hippel-Lindau (VHL) tumor suppressor gene is a particularly robust and
illustrative case. von Hippel-Lindau (VHL) syndrome is a hereditary dis-
ease that predisposes individuals to a variety of cancers that include central
nervous system hemangioblastomas (blood vessel tumors) of the brain and
spinal cord and retinal angiomas. Affected individuals are also at increased
risk for developing clear cell renal cell carcinoma (cRCC), the most com-
mon form of nonhereditary kidney cancer. Other features associated with
VHL syndrome include a specific tumor of the adrenal gland, kidney cysts,
pancreatic tumors, epididymal cystadenomas (tumors of a structure con-
nected to the testicle), and tumors of the ear that may cause hearing loss.
The leading cause of death in patients with VHL disease is metastatic
cRCC.
The story of the discovery of the VHL gene and its role in cRCC be-
gan in the 1980s prior to the Human Genome Project. Marston Linehan
and his colleague Berton Zbar at the NCI sought to identify the cause of
cRCCs. Recognizing that genetic approaches held the key to understand-
ing cancers, Linehan and his colleagues began studying the DNA ex-
tracted from cRCC tumors removed from his patients. These studies
established that a segment of chromosome 3 was consistently missing in
these tumor cells. Given the technology of the day and the absence of a
detailed human genome sequence map, Linehan and Zbar recognized
that the search for the actual genetic locus associated with cRCC would
be lengthy and arduous, if not impossible. The extensive collaborative
effort that would evolve into the search for the VHL gene thus began
with conversations involving other scientists about a more efficient and
promising means to locate it. A decision was made to study individuals
with the inherited form of kidney cancer associated with VHL. cRCC
that does not show a pattern of inheritance in VHL and its association
with the syndrome is termed “sporadic.” The underlying rationale for the
search strategy was that it would be easier to analyze genetic differences
in individuals who had chromosomes passed on to them from relatives
than to look for chromosomal DNA changes in unrelated persons. This
required Linehan, Zbar, and their colleagues to assemble a large team of
multidisciplinary, international collaborators comprising basic and
Collaborative Research 247
and effort. Finding collaborators can be difficult at times, and you may
have to make several attempts to find the right ones. Cutting corners to get
there or making decisions based on incomplete information can lead to
unproductive arrangements that will frustrate the collaborators and may
even harm their professional relationship.
If you are considering collaborating, does your institution take a posi-
tion on the importance of such activity? The tenure and promotion poli-
cies of many institutions are silent on the implications of collaborative
research. This leaves open the possibility that publications resulting from
collaborative work may be underweighted in deciding promotion and ten-
ure because they represent shared effort in a professional environment
where independent productivity is the desired standard. When in doubt
about this, you should seek clarification from your chair or your dean. On
the other hand, some institutions recognize the need for and nature of
collaborative research and accept publications coauthored by collaborators
as appropriate scholarly productivity. In fact, the use of annotated curricula
vitae in the evaluation setting is increasing. By annotating their curricula
vitae, faculty researchers can clearly articulate the role they played for each
publication and what the consequences would have been if they had not
participated.
The emphasis on interdisciplinary research and the formation of collab-
orations to accelerate research progress has helped catalyze training op-
portunities, as well as practical experience, for graduate students and
postdocs. Formal course work, informal brown-bag lunch sessions, and
short-term team projects can all provide rich opportunities for developing
the knowledge and skills to successfully participate in research teams.
Alignment of institutional messages about the importance of collaboration
with the training curriculum is also important. If the institution is going to
support and encourage interdisciplinary training in its graduate programs
and among postdoctoral fellows, it should also make sure it is supporting
the career growth and development of individuals choosing a team re-
search career path. Establishment of agreements with trainees, as described
in the next section, can be one way for the institution to help make sure it
is providing the support required to ensure the trainees are successful in
their next endeavor.
Is it collaboration?
Consider the initiation of a collaboration that is clear-cut. Dr. Shivi, a mo-
lecular biologist, needs to analyze the peptide fragments produced by the
action of a protease she has genetically engineered. She knows that Dr.
Harris, an expert physical chemist, will be able to characterize her peptides
250 Chapter 8
Accountability
Different layers of accountability may accompany collaborations. First,
one or more of the parties to the collaboration may be involved in re-
search that is subject to formal policies, regulations, or laws. Such activi-
ties could include working with human subjects, animals, controlled
substances, hazardous substances, or select infectious agents. All partici-
pants in the research need to confirm their compliance with appropriate
regulations. In some instances, this confirmation will entail having sought
and obtained the appropriate approval or authority to carry out the work.
For example, a collaboration between a clinical research group and a
Collaborative Research 251
what they are called, the purpose is clear. Agreements among people par-
ticipating in a collaborative project or between an individual and his or
her organization provide a robust way of setting clear expectations and
outlining roles and responsibilities.
A collaboration may start out informally, as described above, and you
may not realize you are collaborating until you’re in the middle of it.
Whether a collaboration is formally initiated or happens organically, once
you realize it is happening, it is time to start putting something down in
writing to outline the research as well as to keep the team on track.
An agreement need not be extremely formal; it can, for example, be in
the form of e-mail exchanges documenting conversations. But capturing
the information and having it memorialized in some way is very beneficial
to the team. It provides documentation that any member of the group can
refer to and thereby recall the agreement and the associated responsibili-
ties. It provides a platform for having conversations about how roles and
expectations will change when an existing member leaves the team or a
new person joins. An added benefit to working on such a document is that
it can serve as a scaffold for building trust.
Many people have a visceral reaction to the suggestion of developing an
agreement. The arguments can include stating that great working rela-
tionships do not need this type of formality, that an agreement suggests up
front a lack of trust in the other people involved in the project, and that it
simply wastes valuable time when there is science that needs to be done.
While there may be some truth in each of these statements, they do not
take into account that relationships can falter, memories can fade, and time
well spent planning in advance of or even at the beginning stages of work-
ing together can avert many months of untangling messy situations if ma-
jor conflict does erupt within the group.
Collaborative agreements
A collaborative agreement, or what some affectionately term a “prenup-
tial” for scientific collaborators, can be constructed through a formal pro-
cess or informally by documenting over time conversations and decisions
made. The approach taken may very well depend on the people who are
interacting. And getting them involved in how to approach an agreement
in the first place can help set the stage for the scientific work ahead.
Collaborative agreements typically have several sections addressing
some major issues around which it is healthy to have some agreement.
One topic to cover is the goals and objectives for the collaboration, in-
cluding when the project is “over.” Roles and responsibilities can be as-
signed and clarified. It is important to lay out who will do what. Affirmation
that the collaborators take appropriate responsibility and are accountable
for their behavior is critical.
Collaborative Research 253
Joint appointments
In some institutions it may make sense to set up adjunct appointments for
investigators to work across disciplinary boundaries. Among the items that
need to be discussed and decided are reporting structure and determining
where the administrative home resides, what resources are available to the
investigator from both disciplines, and how annual reviews will be con-
ducted, including scientific review if required. What each department can
expect of the individual as well as what the individual can expect from each
department should be articulated. And finally, a clear and agreed-upon
process should be outlined to make changes to the agreement.
application to the funding agency will contain a letter from the collabora-
tor describing his or her role in the research. The collaborator’s biograph-
ical sketch also will be included in the application. There might even be a
budget request for the collaborator’s salary commensurate with his or her
effort, as well as requests for collaborator supplies and travel. If the princi-
pal investigator of the proposal and the collaborator are at different insti-
tutions, officials from both institutions usually must approve the proposal
if it involves budgetary items. In any event, collaborations that are written
in grant proposals epitomize formality because their existence is clearly
documented in materials that are seen by many people at the institutional
level and the funding agency (e.g., program officers, peer reviewers).
are recognized, and people are learning how to work with each other. Most
importantly, people are learning to trust one another during this stage. As
will be described later, trust is absolutely critical for collaboration. Storm-
ing is not optional, and once the team is formed, should there be any
changes in team membership, the group will go through smaller bouts of
this stage. Norming is the next stage, and it is here that the group settles
into a comfortable rhythm. Trust is solidified, group norms for behavior
and functioning are established, and people develop comfort in working
with each other. The last stage, performing, can be likened to the operation
of a well-oiled machine. The group is functioning well together, is generat-
ing results, and is communicating effectively as an integrated unit.
In the 1970s, the phases of transforming and concluding were added to
the model. These stages recognize the importance of celebrating the work
done together once the project, or a phase of it, is completed. It is impor
tant in the early stages of work together to be clear about when the project
ends. If transforming, the group may re-form, by letting go of some mem-
bers and having others join, in order to take on a new project or initiative.
Trust
Of all the factors that are critical for collaborating with others, trust is
among the most important. Just as it is important for the mentor-trainee
relationship described in chapter 3, it is critical for collaborators, regard-
less of career stage.
It can be difficult for scientists to feel comfortable talking about, or
even reading about, trust. It does not always seem like a very concrete
topic. In fact, some people think of it as a pretty fluffy topic. However, if
you think about it, establishing trust is absolutely critical as a foundation
for open and honest discussion, sharing data and information, and sharing
credit.
In an effort to make the conversation about trust more tangible, it helps
to think about three different types of trust as described in the literature:
calculus-, competence-, and identity-based trust. Calculus-based trust can
be thought of as a very superficial form of trust. It is based on the relative
rewards of trusting. For example, if the policy in a lab or clinic is that the
person who uses the last of a reagent replenishes it, and people do that,
they will earn the trust of the others. However, if one person habitually
ignores the policy, colleagues will learn that there is no reward in placing
trust in that person. A situation like this can cause friction and even con-
flict among lab members. Competence-based trust is very common in the
lab setting. Almost everyone can think of someone with “golden hands”—
someone who always seems to be able to make tricky protocols work or
can troubleshoot a problem well. Individual competence then becomes a
platform for trusting another in the context of the work or project being
Collaborative Research 257
clearly articulated. Thus, developing a shared vision for the group is among
several factors that are truly critical for successful team functioning.
The vision can originate with one individual or can be cocreated by two
or more people. Once you have a group of people working together on a
project, you want to be sure that each member of the team is very clear on
the overall goal, as well as his or her individual work and how it fits into
the big picture. Keeping everyone engaged and revisiting the overarching
goal with the group should be done at regularly scheduled group meetings.
Science moves quickly, directions for individual work can change suddenly,
and course corrections need to be made. Recognizing that and developing
strategies for revisiting goals and objectives at various intervals will keep
everyone focused.
Crafting vision statements can be a very useful exercise for a team.
Working together a couple times a year, the team can write out the overall
goal for the project followed by each member articulating his or her own
goal and what makes it a critical component of the whole. Vision state-
ments provide great material for collaborative agreements or team char-
ters documenting the activities of the team. In addition, these can be kept
on a website, in an online collaboration space, or in the form of short “ele-
vator ride” videos to post as reminders to everyone about how each team
member is contributing to the overall effort.
The inability of the team members to describe the vision toward which
they are expected to devote so much energy can result in dampened enthu-
siasm over time. Vaguely understanding the purpose or how their efforts
are interrelated and contributing overall can lead to people choosing to
work on projects where they can see a more immediate payoff. While we
often think about the leader as providing the vision for the team, if any
participant is having trouble seeing the end goal, it is likely that others are
too. Team participants have a critical role to play in making sure the work
of the entire group stays on track; this may include spearheading the dis-
cussion about individual as well as overall group goals.
Building a team
Teams can be built from the bottom up, wherein a group of investigators
come together with an interest in solving a scientific problem. Alterna-
tively, they can be formed from the top down, where the leaders of the in-
stitution have an idea around which they form a team. Both strategies can
work. However, for teams to really thrive, they need support from the
leadership.
Identifying people to join the team may happen organically in the be-
ginning. At some point, the members collaborating may actively seek out
additional people to join the project, as described earlier in this chapter.
While it may sound easy to identify a new team member, in practice it
Collaborative Research 259
might be more difficult. Think about it this way: if you are contemplating
participating in a team effort, that means you will not spend time doing
something else. It requires balancing your time and thinking about what
level of effort you are willing to commit.
Once you have decided to reach out to identify new collaborators, you
will want to think about the scientific expertise your group requires, the
time you will ask individuals to devote to the effort, and the degree to
which you would like each person to be integrated into the project. With
these things in mind, you can begin your search. It is a good idea to de-
velop questions for potential participants to help you determine if their
interests and motivations align with what you are looking for in a
collaborator.
There are three common strategies for developing interview questions
that can be useful to consider. They include behavior-, performance-, and
values-based questions. Behavioral-based interview questions focus on un-
derstanding how a potential team member would behave in very specific
circumstances. The candidate is asked specific questions about his or her
reactions, behaviors, or skills in specific situations. An example here would
be to ask the candidate how he or she managed conflict with another per-
son when working in a group setting. The performance-based approach
determines whether the person being considered for the position can actu-
ally do the job for which he or she is being considered. While a curriculum
vitae might say the candidate “led a team to successfully identify a gene
that modifies disease susceptibility,” the interviewer would ask the person
to “please describe how you successfully led a team to achieve the accom-
plishment.” Values-based questions are designed to learn about the values
of the candidate and to determine if they match those of the “ideal collab-
orator.” For example, these questions might focus on what interviewees
value most in their work environment as well as what annoys them. The
group identifies the most important characteristics for the ideal candidate
to have and then selects interview questions that will help them determine
if the candidate has the values of interest.
Will it work every time? Dr. Morales was excited about bringing on a
new team member. She prepared her questions for potential collaborators
so as to be sure there would be close alignment with the ongoing effort
with an emphasis on fit. Among the most important questions asked by
each person who talked to a candidate was some version of “Do you like
working in a team setting?” Everyone agreed that Dr. Miki would be a
good addition to the team based on discussions with him. About 3 months
into the project, it was becoming increasingly clear that although Dr. Miki
had the right scientific expertise and had great ideas, he was much more
interested in making sure he was receiving individual recognition and
credit for the team effort. He was leveraging the team’s work to get invited
260 Chapter 8
to give talks without consulting with the rest of the group. He was missing
many group meetings. And it appeared he was less than forthcoming when
it came to sharing data and results at lab meetings when he did come. Al-
though it was a challenging situation, Dr. Morales had a difficult conversa-
tion with Dr. Miki about the apparent difference in their individual
professional goals for participating on the team. They came to the mutual
agreement that Dr. Miki would no longer participate fully, but should the
group need his advice, he would still be willing to provide it.
Building a team also requires the leaders and participants to consider
what each person wants out of the collaboration. From professional growth
and development to accomplishment to feeling like they are helping make
a difference, the motivations behind the commitment can help the team
members support each other and ensure that each person’s goals are being
met—and if not, that they can work together to figure out how they can do
better.
Setting expectations
Who will lead the collaboration? Will it be a single leadership model or
will there be co-or multiple leaders? Who will do what in the collabora-
tion? How will the group members be held accountable for their responsi-
bilities? How will authorship be determined? Who speaks to the media if
they call for an interview? These questions, as well as many others, are
complex ones, often because the initial discussion(s) about the collabora-
tion is among a small group of people who may or may not be representing
others. How will the work assignments be allocated at both the intra-and
interlaboratory levels? Fleshing this out completely may take multiple dis-
cussions if several people will be involved.
The leaders from all sides of the collaboration should also talk about
how decisions will be made. One of the major threats that face people en-
tering collaborations is the need to share power, autonomy, and status.
Things the leaders could do alone may now need to be done together.
Things like adding new members to the collaborative team and determin-
ing when and how to terminate the collaboration (owing to either success
or failure) and how credit will be shared, with special attention to the more
junior members of the team, should be considered. To the extent possible,
all participants of the collaboration should share in the decision-making
process.
As mentioned previously, a collaborative agreement provides a strong
template for establishing expectations among team members as well as
clearly delineating roles and responsibilities. Agreeing to revisit and revise
this document at regular intervals is a good management idea both to cap-
ture changes in the direction the project is going and also to revisit the
roles and responsibilities of the team members.
Collaborative Research 261
thought a fair hearing. Ask if others agree or disagree. And discuss it some
more.
There are many articles and books that talk about active listening. To
emphasize the importance of everyone giving his or her full attention during
group meetings, consider a ban on phones and mobile devices during the
meeting time. In addition, review the characteristics of active listening,
which include paying attention, as evidenced by looking at the person speak-
ing and focusing on what he or she is saying. People can show that they are
listening and that they understand by nodding their heads and asking clari-
fying questions if something is confusing. Also, try not to interrupt before
the speaker has finished. At that time, respond appropriately.
Schedule regular meetings to discuss data and take a look at the current
trajectory of the project. Has it shifted? If so, make the needed adjustments
to the project or the vision. Decide on the best approach for data sharing
and discussion. Refusal to share data, results, and information will breed
mistrust over time. Once mistrust emerges in a collaboration, it threatens
to derail the project if efforts are not made to address the issues at hand. It
is strongly recommended that if you suspect that trust is eroding you
should follow the agreed-upon approach for discussing it as quickly as pos-
sible and develop a strategy to repair it.
Keeping all of the team “in the loop” on the progress of the project makes
a lot of sense. While it can be challenging for groups working in different
buildings or locations at the same institution, not to mention different insti-
tutions in different states or countries, commitment to strategies to keep
everyone on the same page facilitates the efficiency of the collaboration and
keeps the opportunity open for anyone to contribute at will.
There are many electronic collaboration tools available, some of them
as open-source or free solutions, to keep the whole team up-to-date. A fi-
nal word on communication: be proactive. Don’t leave it to the other per-
son or even the leader. If you are not getting the information you need, it
is likely that others are not either. Bring the issue to the attention of the
group and offer up some ideas for how to correct it, which can then be
discussed and a final solution identified. And don’t assume that just because
you’re collaborating with a colleague in your department, proximity will
substitute for communication. It won’t. When collaborating, you have to
work as hard at communicating with someone in the next lab as you do
with someone on another continent!
Language
Different disciplines speak different languages. As such, when people
come together across disciplinary boundaries, it is good to be aware that
all researchers may not speak all the scientific languages represented by
the group members. Engineers, clinicians, basic scientists, and epidemiol-
Collaborative Research 263
ogists all use words, phrases, and jargon that may be unfamiliar to the
other disciplines. It is really obvious when we do not understand some-
thing because we are not familiar with the definition of the word we are
hearing—or we clearly hear it in a different context—and we can ask for
more information.
With science being more global, it is also common to find collaborators
from many different countries for whom the language in which the team is
conversing is a second language. Being aware of language as a difference in
an interdisciplinary group helps people ask clarifying questions, for con-
text, or about definitions when those situations occur.
It is just as important to realize that it is the words we have in common
but use differently in the different areas of science that can cause the most
trouble if we are not prepared for it. For example, at a meeting between
some scientists and information technology specialists who were working
together to develop an analytical tool to make available on a website, the
word “risk” was used. The meeting quickly devolved into a heated discus-
sion about whether the work should really be done. While the scientists
were discussing the work in the context of “high-risk/high-reward” re-
search, the information technology experts were thinking of the word
“risk” in the context of security and privacy concerns. Both groups had
their concept of the word, but failure to understand that the other side was
not using the same definition and construct took some time to sort out.
Teams will also sometimes create their own definitions for words or
sometimes metaphors in order to achieve shared understanding. While
this might be useful for the group, the members also need to remember
that they now have their own jargon that others will not be able to under-
stand. Again, awareness about the differences in language goes a long way
to helping avoid frustration and misunderstanding among the group mem-
bers or between the group and others with whom they are interacting.
Power
Power comes in many shapes and forms. It can show up in the form of
personal characteristics such as one’s skills, charisma, or work ethic. It can
also be conveyed by someone’s performance, output, or results. A person’s
reputation as well as his or her supporters, networks, and relationships can
contribute to the perception of power. It can also be conveyed by position,
role, title, and the ability to reward or punish others. Having information
is another form of power. If one person has information and others do not,
the person is in a powerful position as he or she decides whether to share
or withhold it. Finally, physical size and stature can serve as a source of
visible power.
We see and are provided with examples constantly about how power is
appropriately or inappropriately used during collaborative projects.
264 Chapter 8
from the collaborative experience and what the overall effort can expect of
the mentee. For a full discussion on mentoring, see chapter 3.
Diversity
The case for diversity in the scientific setting is being made at academic
institutions across the nation. Having people from different identity
groups bring their various skills, insights, backgrounds, and experiences
together adds value to the challenges before a group and the strategy used
to address it.
Barry Coller published a paper in 2008 that hits the nail on the head
when comparing the cultures of the physician and the basic scientist. The
contrasts he outlines in 10 areas, from adhering to standards of practice
versus being encouraged to challenge paradigms, to wearing suits and ties
versus dressing in jeans and T-shirt, resonate well for people who live in
these worlds. It is also striking that when physicians and basic scientists see
these differences presented in black and white, they have aha moments.
They get it, and the differences that can cause friction are suddenly put
into a context that is understandable and helps ease tensions.
There is a body of literature providing a case for diversity with respect
to problem solving and innovation. Having people who think about the
world in different ways; have different backgrounds and experiences; and
are familiar with a spectrum of tools, approaches, and knowledge bases can
have more impact when developing a strategy or solving a problem. Solv-
ing complex problems can be enhanced by maximizing differences such as
work styles, norms, values, and worldview.
Differences in personality, race, culture, and gender are equally valuable
and also require effective management in the team setting. The value of
greater diversity can be seen in various ways. In the medical setting, diver-
sity provides a strong advantage to truly understanding the needs of the
patient by bringing together different perspectives, backgrounds, and
experiences.
Increasing the diversity in the biomedical workforce is valuable pre-
cisely because each person will come to science with different perspectives
on what the most important problems facing us today are. For example,
men and women will have different perspectives on female and male re-
productive diseases and challenges. People from different racial or cultural
backgrounds may have very different views of disease and approaches to
detection, diagnosis, and treatment that can greatly influence how the
problem is approached.
It can be helpful to distinguish between diversity and inclusion. Diver-
sity has been described as the noun and inclusion as the verb. Whereas
diversity describes the composition of the workforce and provides a
Collaborative Research 267
Authorship
Collaborators must establish ground rules for the sharing of data that
emerge from joint research projects. The trust that must accompany a suc-
cessful collaboration undergirds data sharing activities. But unexpected
situations may arise, and collaborators must be prepared to deal with them.
Consider two labs collaborating to clone a transcription factor. Lab A has
purified the protein and prepared antibodies; lab B will screen an expres-
sion library to identify the clone. Clearly, lab B will receive a portion of the
268 Chapter 8
highly specific monoclonal antibody, and the resulting DNA clone will be
shared. Will lab B also receive the hybridoma cell line?
In a similar vein, consider a case in which lab C has isolated and deter-
mined the sequence of a cDNA that appears to encode a new member of a
protease family. Lab C collaborates with lab D—experts in that protein
family— by sending it in vitro translated protein for characterization.
Should lab D also expect access to the cloned cDNA? Cases like these of-
ten arise. Sometimes the same answer seems obvious to both parties; fre-
quently it does not. The resolution has obvious bearing on the abilities of
the individual labs not only to replicate portions of each other’s work but
also to undertake independent work at the conclusion of the collaboration.
The advisable course of action is to discuss and settle these issues as soon
as they can be foreseen.
All of these elements are things that can be included in a formal or in-
formal collaborative agreement. It cannot be emphasized enough that
written agreements can form very good scaffolds for building trust. They
capture the agreed-upon process that the group developed together. As the
group builds trust and becomes more cohesive, documenting decisions will
become part of how the group works together.
It is also necessary that all parties to the collaboration have a clear under-
standing of data ownership and custody issues. Usually, ownership will be
governed by the type and source of funds that have been used to support the
research. In the case of NIH funding, the data are owned by the grantee
institution (see chapter 9), and this will have implications for collaborative
research that is done at different institutions and supported by the indi-
vidual NIH grants of the collaborating principal investigators. The princi-
pal investigators and their respective grantee institutions will be subject to
the policies governing ownership, custody, and retention of data imposed by
the granting agency. Data books and research data created at one site will
thus remain at that site, in keeping with the policies governing the grantee
institution. But the sharing of materials— both during and after the
collaboration—must be worked out by the collaborators. The NIH data
sharing policy provides useful guidance on a wide range of topics related to
sharing research data and is recommended as a guide for collaborators.
Typically, guidelines on collaboration (and authorship) say that if some-
one provides research materials that are part of published results, the do-
nor of the materials is acknowledged in subsequent publications. Simple
provision of materials already described in the public domain usually does
not constitute grounds for collaboration. A National Academy of Sciences
report on sharing data states explicitly that “it is unacceptable to require
collaboration or co-authorship as a condition of providing a published ma-
terial, because that requirement can inhibit a scientist from publishing
findings that are contrary to the provider’s published conclusions.” Yet
Collaborative Research 269
High
Compete Collaborate
Assertive behavior
Compromise
Avoid Accommodate
Low
Low High
Cooperative behavior
Each of the conflict styles has pros and cons. And each may be appro-
priate in a different situation. Typically, the major considerations boil down
to relationships and time. When you care about the relationships you are in,
you want to take an approach to the conflict that preserves that dynamic.
For example, if a relationship is important to you but the outcome of the
issue is not, you may choose to use an accommodating approach. However,
if time is critical, such as in an emergency, making the decision quickly out-
weighs the relationship and so the competing approach would be most ap-
propriate. When people are tired or under stress, they will fall into using
the approach that is most natural to them. This knowledge can help you
anticipate reactions to situations by your coworkers. It can also help you
learn that if you are going to try practicing a different style, it is better to do
so when you’re not tired or under stress.
Assessments are great, as they help us develop insights into our own
behaviors and characteristics, as well as those of others. The major draw-
back to them is that people who find it convenient to use descriptors as
labels can misuse them. The intent of the Thomas-Kilmann and other as-
sessments is to build self-awareness, provide a catalyst for exploring other
styles and approaches depending on the situation, and understand those
around us better with the intent of creating strong work relationships.
When you do find yourself in a situation that requires a difficult conver-
sation, there are steps you can take to maximize the chances of getting
Collaborative Research 271
through it successfully. The more frequently you practice, the better you
will get. And even if that means moving from horrible to not bad, that is a
great accomplishment.
The first step when you find yourself in a conflict situation is to deter-
mine whether it is important enough to try to resolve. Ask yourself, “What
is the purpose of pursuing a conversation to resolve the conflict?” If you
have a good answer, then it makes sense to move forward. Start with some
planning. Decide what outcomes are important for you at the end of the
conversation and the best approach for the discussion. Invite the other per-
son to meet with you and let them know ahead of time why you want to
meet with them. This gives them a chance to plan for the discussion as well.
Once you get together, share with the other person why you asked to meet
with them, frame the situation you are in, and invite them to talk about their
perspective first. By asking them to speak first and by listening actively, you
are letting them know you value their side of the story. In addition, when it
is your turn to speak, they are more likely to pay closer attention. Since they
have just spoken, they will not be mentally preparing what they are going to
say to you while you are talking. Once you both have had a chance to share
your side and perspective, see if you can identify what is called the “third
story,” that is, the explanation for how the disagreement arose that is likely
somewhere in between your two stories. The next step is to establish a path
forward. How can you get past this disagreement, and what can you do to
prevent disagreements in the future? Productive conversations require both
people to want to work together to solve the problem.
We recognize that the above paragraph makes this sound easy. It is not.
Having conversations like this is very difficult, and sometimes it is not pos-
sible to engage someone when the conflict is extremely strong or you feel
that it would be a risk to bring up. In situations like that, it is best to bring
in a third party to help facilitate or mediate the conversation. This can be a
colleague who is trusted by both parties or an ombudsman from the insti-
tution whose job is to help resolve conflicts in the work setting.
The best time for collaborators to decide how to manage conflict is
while they are starting to establish their working relationships. Just as
talking about the shared vision or setting expectations is important for
successful team functioning, so is agreeing ahead of time how the group
members will intervene, and giving them permission to do so, if it senses
emerging or active conflict among the project participants.
that informed consent not be sought from each individual out of respect
for the cultural traditions of the community. An additional dimension of
this problem surfaces if we suppose that in this small village-based society
the concept of the germ theory of disease is unknown or is not accepted
by its members. Can there be a realistic expectation of informing poten-
tial experimental subjects of research concepts and risks under these
circumstances?
The existence of international guidelines addressing the use of humans
in biomedical experimentation, especially the Declaration of Helsinki,
should always set the tone for such research (see chapter 5). The position
that local traditions should never compromise scientific or ethical stan-
dards has been affirmed by some. Clearly, there is a need to identify and
deal with potential problems linked to ethical and cultural issues that have
an impact on international clinical research. These matters must be care-
fully discussed by all collaborators before any research begins, and tools
such as collaborative agreements are used to guide those discussions.
It is worth mentioning that when collaborating internationally, there is
a need to be mindful of cultural competence. Learning about a country’s
customs, expectations, and signs of respect in advance of a visit or interac-
tions is critically important. In addition, when it comes to the documents
this chapter has encouraged using, such as collaborative agreements, it is
important to step slowly to be sure the norms of the culture are well un-
derstood so that the suggestion of an agreement is embraced and not inter-
preted as a slight.
Conflict of Interest
Miscellanies
Do not assume that previous successful collaborations will ensure the suc-
cess of future ones with the same colleagues. Positive collaborations some-
times create an environment for working together on subsequent joint
projects. But you must forge each new project with previous collaborators
using the same care and attention to detail as you did in the past.
Last, a word on collaboration and professional development of scien-
tists is in order. Institutions and review committees find it difficult to al-
locate appropriate credit for publications generated by faculty in
collaborative research projects. Because independent work is the prevail-
ing measure of scientific identity, junior scientists establishing their ca-
reers need to recognize the importance of balancing collaborative and
independent work.
For those involved in collaborative work prior to tenure, again, it is valu-
able to set up a pretenure agreement (described above) with the department
or institution that clearly outlines expectations for both sides. Some institu-
tions are collecting annotated curricula vitae for evaluation at tenure. An an-
notated curriculum vitae provides the investigator with the opportunity to
clearly state his or her role on every paper listed. Letters of support for
tenure, typically requested from noncollaborations, can also be collected
from active collaborators, as is done in the physics field. This is a robust way
to have the reviewer provide commentary specifically about how the scien-
tist under review is viewed by his or her peers with respect to leadership and
contributions to the collaborative work. The reviewer can distinguish active
contributions from riding on the coattails of the group effort.
276 Chapter 8
Conclusion
Discussion Questions
Case Studies
8.1 Dr. Shirika Sands receives an e-mail message from Chris, a doc-
toral student in another department, asking her if she would be
willing to meet with him to talk about his research project. Chris explains
Collaborative Research 277
asked for reports from each of the participants. Dr. Kelly was visibly upset
when Dr. Crispin reported that the experiment assigned was trickier than
originally thought and it would take another week to generate results. Dr.
Lee, stepping in to try to lend support to Dr. Crispin, was again ignored by
Dr. Kelly, who moved on to hear from Dr. Anad. At this point of the meet-
ing, Dr. Anad, a full professor in the genetics department, invited the group
to take a short break before the next update. Dr. Anad had been both par-
ticipating and observing the dynamics of the meetings. After the break, Dr.
Anad, instead of giving a scientific update, invited the group to have a dis-
cussion about the overall project and the group dynamic. What should the
group talk about at this stage of their collaboration? Specifically, if you
were Dr. Anad, how would you frame the discussion that needs to take
place? What would be your goal, and how would you guide the conversa-
tion to move toward it?
WSU faculty member and not to the institute. She calls you, the dean of
her school, and asks for advice and intervention to move the blood samples
back to the university. What do you tell Jane, and what, if any, actions will
you take to resolve this disagreement? What could have been done to pre-
vent this disagreement from taking place?
8.5 Nicholas Cole and Lauren Hunter work on the genetics and bio-
chemical bases of asthma using mouse models. Their work has
overlapped at times, causing some intense debate between the two at na-
tional meetings. But a few years ago they entered into a productive collab-
oration. Nicholas, a biochemist, developed a powerful new assay for
components associated with the activation of immune cells. Lauren, a
280 Chapter 8
8.6 You have had a radical idea regarding how to get eukaryotic cells to
take up large DNA fragments much more efficiently than was pre-
viously possible. You tell your colleague Maria about your idea and how
you plan on testing the hypothesis. Maria is not in your field of expertise,
but you spend some time explaining to her the details of your plan and the
expected outcomes. Maria offers a number of unsolicited suggestions on
how to improve the study. Because of her lack of experience, many of her
ideas are not practical or are very elementary and part of your study any-
way. However, Maria suggests some valuable control experiments involv-
ing DNA competition assays, which help you make a compelling case for
the novelty and efficiency of your method. Maria talks to you frequently
about the project and comes to several of your lab presentations. She com-
ments critically on your work and makes other suggestions, including the
idea that you try different cell types to further build your case. She offers
Collaborative Research 281
to try your method on several cell lines that are routinely maintained in
her laboratory. You are reluctant to do this, but you suggest that she give
you the cell lines so you can do the experiments. She complies, and the
experimental results you obtain with her cells further support your hy-
pothesis. You decide to submit a provisional patent application and then
submit your exciting results as a short communication to a prestigious
journal. Maria argues strongly that her name should be included both as a
coinventor on the application and as a coauthor on the manuscript. How
do you respond? What is the rationale underlying your response?
8.7 Dr. Catharine Reynolds directs a research team for a large pharma-
ceutical firm, MedScope, Inc. Dr. Reynolds has developed a genetic
cassette for cloning, identifying, and expressing eukaryotic cDNA. She has
used a commercially available, patented vector purchased from a biotech
company, Vector, Inc., as the platform to demonstrate the utility of the
cassette. In keeping with MedScope’s policy on reporting basic research,
she submits a manuscript for corporate review coincidentally with sending
it off for consideration by the journal Cloning Tools and Techniques. While
the manuscript is under peer review, Dr. Reynolds is notified by Med-
Scope’s legal review office that she may publish the paper but will not be
allowed to distribute the vector to anyone requesting it, even under the
authorization of an MTA. The reason given is that Vector, Inc. owns the
vector sequences in her construct, so they are not hers (or MedScope’s) to
distribute, even in derivatized form. Dr. Reynolds calls you, the editor-in-
chief of Cloning Tools and Techniques, and explains her dilemma. She pro-
poses to append a footnote to the paper indicating that corporate policy
prevents distribution of the construct described in the paper. However, she
will make the purified cassette available to anyone who requests it. This
will allow the construction of the ultimate vector. If the paper receives a
favorable review, will you allow it to be published with Dr. Reynolds’s sug-
gested modification? Why or why not? Are there other solutions to Dr.
Reynolds’s dilemma?
8.8 You and your collaborators, Drs. Arun Rao and Rachel Redhouse,
have submitted a coauthored paper reporting on the regulation of
a gene introduced by transfection into fibroblasts. The paper is returned
by the editor of the journal with two very positive reviews, suggesting only
minor revisions. While the paper is being revised, one of Dr. Rao’s post-
doctoral fellows—Ursula Enquist—presents data at a lab meeting demon-
strating that the results of the gene regulation experiments are dependent
on the concentration of DNA used to transfect the cells. Dr. Enquist pre
sents data showing that if the concentration of the gene construct is in-
creased 5-fold, the previously reported regulatory effects are completely
282 Chapter 8
abolished. In light of these results, Dr. Rao argues that the paper should be
withdrawn and not allowed to go to press. Dr. Redhouse strongly objects
to this. She argues that the results of the paper are reproducible and the
interpretations of the results are straightforward. Instead, she suggests that
the new results may be the basis for a whole new paper and that these data
should not even be mentioned in the present manuscript. In summary, Dr.
Redhouse argues that the paper should be published with the minor revi-
sions suggested by the reviewers. Your collaborators turn to you for your
opinion and for guidance on how to settle this dispute. What do you say?
Resources
Print
Bennett LM, Gadlin H. 2012. Collaboration and team science: from theory to
practice. J Investig Med 60:768–775.
Bennett LM, Gadlin H. 2014. Supporting interdisciplinary collaboration: the
role of the institution, p 356–384. In O’Rourke M, Crowley S, Eigenbrode SD,
Wulfhorst JD (ed), Enhancing Communication & Collaboration in Interdisciplinary
Research. SAGE Publications, Inc, Thousand Oaks, CA.
Bennett LM, Gadlin H, Levine-Finley S. 2010. Collaboration and Team Science:
A Field Guide. NIH Publication No. 10-7660. National Institutes of Health,
Bethesda, MD. https://ccrod.cancer.gov/confluence/download/attachments
/47284665/TeamScience_FieldGuide.pdf?version=2&modification
Date=1285330231523&api=v2.
Burroughs Wellcome Fund. 2009. Excellence Everywhere: A Resource for Scientists
Launching Research Careers in Emerging Science Centers, p 145–156. Burroughs
Wellcome Fund, Research Triangle Park, NC. http://www.excellenceevery
where.org/images/book/excellence_everywhere.pdf.
Burroughs Wellcome Fund and Howard Hughes Medical Institute. 2006.
Making the Right Moves: A Practical Guide to Scientific Management for Postdocs
and New Faculty, 2nd ed, p 201–210. Burroughs Wellcome Fund, Research Tri-
angle Park, NC, and Howard Hughes Medical Institute, Chevy Chase, MD.
http://www.hhmi.org/sites/default/files/Educational%20Materials/Lab%20
Management/Making%20the%20Right%20Moves/moves2.pdf.
Clark PE, Cookson MS. 2008. The von Hippel-Lindau gene: turning discovery
into therapy. Cancer 113(7 Suppl):1768–1778.
Coller BS. 2008. Translational research: forging a new cultural identity. Mt Sinai J
Med 75:478–487.
Depret EF, Fiske ST. 1993. Social cognition and power: some cognitive conse-
quences of social structure as a source of control deprivation, p 176–202. In
Weary G, Gleicher F, Marsh KL (ed), Control Motivation and Social Cognition.
Springer-Verlag, New York, NY.
284 Chapter 8
Edmondson AC. 2003. Speaking up in the operating room: how team leaders pro-
mote learning in interdisciplinary action teams. J Manag Stud 40:1419–1452.
Estrada M, Brown J, Lee F. 1995. Who gets the credit? Perceptions of idiosyn-
crasy credit in work groups. Small Group Res 26:56–76.
Gabarro JJ. 1987. The development of the working relationship, p 172–189. In
Lorsch J (ed), Handbook of Organizational Behavior. Prentice-Hall, Upper Saddle
River, NJ.
Gadlin H, Bennett M. 2012. Dear Doc: advice for collaborators. Transl Behav Med
2:495–503.
Latif F, Tory K, Gnarra J, Yao M, Duh FM, Orcutt ML, Stackhouse T, Kuzmin
I, Modi W, Geil L, Schmidt L, Zhou F, Li H, Wei MH, Glenn GG, Rich-
ards FM, Crossey PA, Ferguson-Smith MA, Le Paslier D, Chumakov I,
Cohen D, Chinault CA, Maher ER, Linehan WM, Zbar B, Lerman MI.
1993. Identification of the von Hippel-Lindau disease tumor suppressor gene.
Science 260:1317–1320.
Lee F. 1993. Being polite and keeping MUM: how bad news is communicated in
organizational hierarchies. J Appl Soc Psychol 23:1124–1149.
Linehan WM. 2012. Genetic basis of kidney cancer: role of genomics for the de-
velopment of disease-related therapeutics. Genome Res 22:2089–2100.
National Research Council. 2003. Sharing Publication-Related Data and Materials:
Responsibilities of Authorship in the Life Sciences. National Academies Press, Wash-
ington, DC. http://www.nap.edu/catalog.php?record_id=10613.
National Research Council. 2004. Facilitating Interdisciplinary Research. National
Academies Press, Washington, DC. http://www.nap.edu/catalog.php?record
_id=11153.
National Research Council. 2011. Examining Core Elements of International Re-
search Collaboration: Summary of a Workshop. National Academies Press, Wash-
ington, DC. http://www.nap.edu/catalog.php?record_id=13192.
O’Rourke M, Crowley S, Eigenbrode SD, Wulfhorst JD (ed). 2014. Enhancing
Communication & Collaboration in Interdisciplinary Research. SAGE Publications,
Inc, Thousand Oaks, CA.
Thomas KW, Kilmann RH. 2002. Thomas-Kilmann conflict mode instrument.
CCP, Inc., Mountain View, CA. (Online access to the Thomas-Kilman
Instrument available for a fee at http://www.kilmanndiagnostics.com/catalog
/thomas-kilmann-conflict-mode-instrument).
Travis J. 1993. New tumor suppressor gene captured. Science 260:1235.
Tuckman BW. 1965. Developmental sequence in small groups. Psychol Bull
63:384–399.
Tuckman BW, Jensen MA. 1977. Stages of small-group development revisited.
Group Organ Stud 2:419–427.
University-Industry Demonstration Partnership. 2012. The Researcher Guide-
book: A Guide for Successful Institutional-Industrial Collaborations. Georgia Tech
Research Corporation, Atlanta, GA. http://www.industry.gatech.edu/files/
UIDP-Researcher-Guidebook.pdf.
Collaborative Research 285
Online
National Institutes of Health (NIH) information on multiple principal in-
vestigators on grant applications:
http://grants.nih.gov/grants/multi_PI/
Introduction
*Counsel for Intellectual Property, Federal Trade Commission. The views ex-
pressed are those of the author and do not necessarily reflect those of the Federal
Trade Commission or any of the commissioners or staff.
Scientific Integrity: Text and Cases in Responsible Conduct of Research, 4th ed.
by Francis L. Macrina
© 2014 ASM Press, Washington, DC
doi:10.1128/9781555818487.ch9
287
288 Chapter 9
Research Data
States also have open records laws or freedom of information laws that
allow the scientific community and the public to request information in
the possession of state agencies including public universities, state-
supported research institutions, and the like. Similar to federal laws, state
laws have provisions for granting exception from release in order to pro-
tect sensitive information (e.g., unpublished research data). State universi-
ties typically have an office or an individual who receives and coordinates
the responses to requests for material under the state law. Often the uni-
versity will have a page on the institutional website that outlines the pro-
cess for submitting and handling requests. Researchers at public institutions
should be familiar with this process so as to ensure that such requests for
information are handled under the proper protocol and in compliance
with applicable laws. Researchers should never attempt to respond individ-
ually to a request for information made under the FOIA or an FOIA-like
law. Instead, requests made directly to them should be referred to the uni-
versity official in charge of the FOIA response process. Finally, private uni-
versities are not generally subject to state open records or FOIA-like laws.
However, research or training-related data requested from the NIH under
the federal FOIA law could lead to the public release of such information
held by the private institution.
Data sharing
Topics related to the sharing of research data have appeared elsewhere in
this text. In chapter 4, we discussed the common practice of journal pub-
lishers making the sharing of research materials a condition of publication.
Such materials are expected to be shared at the cost of provision, in
292 Chapter 9
The NIH specifically mentions data sharing in its Grants Policy Statement
as applying to research carried out under all NIH grant awards. The state-
ment reads:
NIH believes that data sharing is essential for expedited translation of re-
search results into knowledge, products, and procedures to improve human
health. NIH endorses the sharing of final research data to serve these and
other important scientific goals and expects and supports the timely release
Research Data and Intellectual Property 293
and sharing of final research data from NIH-supported studies for use by
other researchers. “Timely release and sharing” is defined as no later than
the acceptance for publication of the main findings from the final data set.
There also are specific requirements in the NIH data sharing policy.
First, all NIH applications that will produce novel, genetically modified
variants of model organisms are expected to include a plan for sharing such
organisms or a statement explaining why sharing will be restricted or not
possible. Model organisms include but are not restricted to (i) nonhuman
mammalian models such as mice and rats and (ii) nonmammalian models
such as budding yeast, social amoebae, roundworms, Arabidopsis, fruit flies,
zebrafish, and frogs. Second, the NIH requires that investigator-initiated
grant applications with budgets of over $500,000 in direct costs in any
single year contain a plan that addresses how data sharing will be managed.
The NIH also may impose, at the agency’s discretion, the requirement of
the inclusion of a data management plan on specific funding opportunity
announcements regardless of requested budget amounts. Examples of
NIH data management plans may be accessed using information provided
in the “Online” section under Resources at the end of this chapter.
The NSF requirements for data sharing are broadly inclusive compared
with the NIH policy. The NSF data sharing policy first articulates the ex-
pectation that all NSF-funded investigators will share “primary data, sam-
ples, physical collections and other supporting materials created or
gathered in the course of work under NSF grants.” The NSF defines
“data” as covered by its data management plan requirement as that “deter-
mined by the community of interest through the process of peer review
and program management.” Data in this context may include “data, publi-
cations, samples, physical collections, software and models.” On the issue
of supporting data, the NSF says:
All researchers are expected to be able to explain and defend their results.
Doing so usually entails maintaining complete records of how data were col-
lected. The manner in which one maintains such records and makes them
available to others will vary from project to project. What constitutes rea-
sonable procedures will be determined by the community of interest through
the process of peer review and program management. These standards are
likely to evolve as new technologies and resources become available.
NSF when dealing with what may or may not be considered reasonable
in terms of sharing materials and data. As an example, the NSF Director-
ate for Biological Sciences suggests that data management plans for grant
applications it oversees be organized according to the following
elements.
1. Describe the data that will be collected, and the data and metadata
formats and standards used.
2. Describe what physical and/or cyber resources and facilities (includ-
ing third-party resources) will be used to store and preserve the data
after the grant ends.
3. Describe what media and dissemination methods will be used to
make the data and metadata available to others after the grant ends.
4. Describe the policies for data sharing and public access (including
provisions for protection of privacy, confidentiality, security, intellec-
tual property rights, and other rights as appropriate).
5. Describe the roles and responsibilities of all parties with respect to
the management of the data (including contingency plans for the
departure of key personnel from the project) after the grant ends.
There are generally two forms of property: real property, which pertains to
real estate or land; and personal property, which pertains to all other forms
of property. Personal property rights can be categorized as to whether the
property is tangible (having physical form) or intangible. Intellectual prop-
erty as generally discussed is intangible. While an embodiment of intellec-
tual property has a tangible form (e.g., a paper document for which an
author holds a copyright), the intellectual property itself has no physical
form. However, personal property rights, in addition to intellectual prop-
erty rights, exist in the tangible material itself (e.g., a personal property
right in the paper document per se, such as the right to possess). Similarly,
biological research materials, such as immortalized cell lines, are tangible
personal property for which the creator or assignee holds rights, in addi-
tion to any intellectual property rights that may exist in the materials.
As with any tangible personal property, the physical possession of the
property is one of the property rights. Other rights may include rights to
use, dispose, transfer, or assign. For example, most computer software li-
censes state that the licensee is a user of the software, but not an owner.
This reflects the rights in the limited use(s) of the intellectual property
(i.e., copyright). But the use of the physical embodiment of the software,
such as exists on a disk, is restricted. The licensor software vendor has the
right to take back possession of the software from the user.
To promote a policy of ensuring the public availability of results and
accomplishments from research funded by the U.S. Department of Health
and Human Services, institutions that have been awarded an NIH research
grant or contract are required to make available for commercialization or
research those products of research developed with federal funding that
are patentable but unpatented. Obviously, those products of research that
are patented were already covered under the regulations. A grantee institu-
tion may satisfy this requirement by granting a license under personal
property rights in the tangible research materials (e.g., biological materials
license), provided the license terms are no more restrictive than the terms
of a patent license, if those materials were patented.
The NIH found that in some instances grantee institutions, which have
a right to elect title to patentable inventions developed with federal funds
(see “Patents”), were not making the research materials publicly available
or were agreeing to license them only under restrictive terms that inhib-
ited public access. Under the prior regulations, the NIH could only elect
title to those patentable inventions for which the grantee institution
296 Chapter 9
declined to elect title. The NIH determined that its policy to promote
public access to funded research results was not furthered when grantees
exercised their property rights only in the tangible materials that were not
publicly available. Under current regulations, the NIH will assume title to
those patentable research materials developed with federal funds if the
grantee institution does not elect title or agree to conditions of public ac-
cess, at least for research purposes.
Trade Secrets
Legally defined, a trade secret means information, including a formula,
pattern, compilation, program, device, method, technique, or process, that
(i) derives independent economic value, actual or potential, from not being
generally known and not being readily ascertainable by proper means by
other persons who can obtain economic value from its disclosure or use;
and (ii) is the subject of efforts that are reasonable under the circumstances
to maintain its secrecy.
In other words, a trade secret is information that is not publicly known
but that confers an economic value upon its owner and that its owner takes
reasonable steps to maintain as secret. The protection of trade secrets is
governed by individual state laws, not federal laws. Traditional legal pro-
tection of trade secrets is founded upon principles of contract law and civil
misappropriation but does not cover unauthorized use per se. However, le-
gal action can be taken against someone who fails to keep the secret as
obligated under contract or a fiduciary relationship or against someone
who obtains the secret illegally. A federal trade secrets act provides crimi-
nal penalties for a federal employee who discloses without permission in-
formation that concerns or relates to trade secrets provided to the U.S.
government.
For information to qualify as a trade secret, the courts, in actions
brought for infringement, have based their decisions on such issues as the
following: (i) the information was not readily available by independent re-
search, (ii) the information must have been used in business operations,
and (iii) the information provided a competitive advantage. Other issues
used by the courts in determining the status of a trade secret have included
the cost of developing or acquiring the trade secret, who within the busi-
ness knows the trade secret, and what the business has done to ensure that
the information remains secret. However, independent research and “re-
verse engineering” approaches have been determined to be legitimate
means to obtain trade secret information.
The Economic Espionage Act of 1996 (Public Law 112-269) is a federal
criminal statute enacted by the U.S. Congress that provides for monetary
penalties, incarceration, and forfeiture of property for the theft or
Research Data and Intellectual Property 297
Trademarks
often rely on trademarks to know what they can expect if they buy the prod-
uct or service. This affords a degree of predictability in commerce that is
important to business. A related mark is the service mark, which serves the
same purpose as a trademark but denotes a service rather than a product.
Trademarks may be registered at both the state and federal levels. Alterna-
tively, a trademark can be used without any type of legal registration; how-
ever, enforcement against an infringer of the mark may then be limited.
Federal trademarks are issued by the U.S. Patent and Trademark Office
(PTO) for a fee upon the filing of an application by the applicant and a
search conducted by the PTO. Trademark registration lasts for 10 years
but can be renewed indefinitely for 10-year periods (with fees and the fil-
ing of an application). Foreign trademark protection must be sought sepa-
rately in the foreign jurisdiction in which protection is desired. The
unauthorized use in commerce of a mark (trademark or service mark)
owned by a first party may constitute infringement by a second party if the
latter’s use creates a likelihood of confusion as to the source of the goods
bearing the mark. The courts have considered various defenses to an ac-
tion against an infringer, including (i) whether or not there was a likeli-
hood of confusion, (ii) whether the mark was valid, (iii) whether the use
was authorized, and (iv) whether the mark was merely a descriptive term.
Copyrights
Thus, in the context of this language, faculty who prepare original articles
on their research findings hold the copyright to such material. When an
article is accepted for publication, the author(s) usually—but not always—
assigns the copyright to the publisher of the journal in which it will appear.
The NIH and funding agencies in general encourage the publication of
research results. The NIH specifically provides that appropriate material
created under a grant may be copyrighted by the grantee. In practice, this
usually means the principal investigator (and any coauthors) hold the
copyright. However, as with ascertaining any legal right, competent legal
counsel should be sought in order to understand the effect of all applicable
laws and regulations.
Current copyright law provides that fair use of copyrighted material will
not constitute an act of infringement. An individual may copy from a pro-
tected work as long as the value of the work is not diminished and such ac-
tivity is nonprofit in nature. Fair use activities must be related to (i) criticism,
302 Chapter 9
(ii) news reporting, (iii) teaching, or (iv) research or scholarship. Other con-
siderations of fair use include the nature of the work, the quantity and sub-
stance of the material being copied as compared with the copyrighted work
as a whole, and the possible effect of such use on the potential market for the
copyrighted material. Photocopying an article from a scholarly journal for
your personal (nonprofit) use is generally recognized as a fair use practice.
On the other hand, preparing a compendium of photocopied chapters from
several textbooks for use in a graduate course and distributing these docu-
ments at a fee to cover the copying costs would likely represent copyright
infringement. Such use could be reasoned to diminish value (i.e., students
would not buy the books). Thus, the market for the books would be nega-
tively affected. Similar arguments can be made for the photocopying and use
of articles from serial publications. Indeed, court rulings have been clear in
finding copyright infringement in cases when a person who does not hold
the copyright distributes photocopied compendia of works without permis-
sion of the copyright holder and when a third party copies and distributes
serial publication articles. The interpretation of fair use under the above-
mentioned criteria holds that the copying and use must be of a personal
(nonprofit) nature; that is, articles are copied by the individual who intends
to use them under one of the categories related to fair use. Recent case law
has held that reproduction and use of copyrighted documents for litigation
or in connection with federal agency business (e.g., use in connection with
patent applications before the U.S. PTO) generally falls under the doctrine
of fair use.
Computer software applications usually are covered by copyright law.
Inspection of the narrative associated with software purchased on media or
downloaded will reveal program copyright information. Usually, commer-
cially available software is marketed under a so-called end user’s agree-
ment. This type of agreement between you and the software seller provides
that you observe copyright law as it pertains to the computer program. Its
language usually indicates that the software is being issued to you under a
limited, nonexclusive license. This always means you cannot electronically
copy the program and provide it to other individuals for their use under
any circumstances. Transfer of the software or documentation in whole or
in part to another party is often explicitly prohibited. In some cases, these
agreements specify the conditions for personal use of the software. For
example, you might be able to install the program on no more than one or
two of your personal computers. Wording associated with software pack-
ages often states that you agree to the terms of the software license when
you break the seal on the software package or open the envelope that holds
the electronic or optical media. In the case of downloaded software pro-
grams, this assertion is affirmed by the end user clicking an “I agree” field
Research Data and Intellectual Property 303
presented before installation of the program. Thus far, courts have been
readily inclined to enforce licenses protected in these ways.
Some software is marketed under agreements called site licenses. This
commonly applies to educational and business institutions and involves the
authorization of multiple users for a software program. In this case, the li-
cense is made to the institution, and the individual agrees to honor the
copyright that protects the software. Site-licensed software can be used
only at the institution that holds the license. So-called copy-protected soft-
ware makes the unauthorized use of software difficult, if not impossible.
Copy protection may be part of the software system itself or may involve a
hardware device that is sold with the program. Such protection prevents
copying or use of the software on machines other than the one on which
initial installation took place. Copy protection is used by some manufac-
turers for specialized or costly programs. An increasing number of con-
temporary software packages come with significant copy protection and
upon installation may require that the installer enter a specific serial num-
ber that is provided under the license. Without the serial number, addi-
tional copies of the software may not be subsequently installed. Thus, users
of such software are entrusted with ensuring the appropriate legal opera-
tion of purchased programs. Transgressions of computer software copy-
rights are morally and legally wrong.
In the late 1990s, the U.S. Congress passed two major pieces of legisla-
tion aimed at strengthening enforcement of copyrights: the Digital Mil-
lennium Copyright Act (DMCA) and the Digital Theft Deterrence and
Copyright Damages Improvement Act (Copyright Damages Act). The
DMCA was enacted to bring U.S. copyright law into conformity with in-
ternational treaties pertaining to copyright protection. The DMCA does
not change the concept of copyright but adds legal provisions that relate to
electronic forms of expression. It is explicit in affirming that it has no effect
on the extant “rights, remedies, limitations, or defenses to copyright in-
fringement, including fair use.”
The DMCA takes a two-pronged approach to enforcing copyrights
on digital works. First, it provides for digital “fingerprints” or antipiracy
measures in the work. To protect these digital fingerprints or antipiracy
measures, the DMCA contains two specific prohibitions. It makes it a
crime to directly circumvent or “crack” any antipiracy measures built
into software or to do so indirectly by selling or distributing tools or
technology designed to defeat any such measures. While the DMCA
does permit bona fide research on encryption, product interoperability,
and computer security that would involve the cracking of copyright pro-
tection or antipiracy measures, some researchers have expressed concerns
that the threat of litigation under the DMCA has cast a chill over the
304 Chapter 9
Patents
The term “patent” is derived from the Latin patens, meaning “to be open.”
This term refers to the royal grants of the British monarchy that were “let-
ters open,” or litterae patentis. The early British patents granted during the
14th through 16th centuries were in fact royal grants of monopoly in a
Research Data and Intellectual Property 305
Whoever invents or discovers any new and useful process, machine, manu-
facture, or composition of matter, or any new and useful improvement
thereof, may obtain a patent therefore subject to the conditions and require-
ments of this title. (35 U.S.C. §101)
made of somatic and germ line cells. The germ line cells—egg cells and
sperm cells—have reproductive capability, while somatic cells do not. The
combining of the germ line cells during fertilization results in the genetic
composition of the embryo. So the genetic sequences of the germ line cells
are inheritable, being passed from parent to offspring. Genetic therapy di-
rected to the germ line may in some instances be more technically effective
in replacing or repairing mutations that cause disease. However, modifica-
tions in the germ line may affect generations, while somatic cell modifica-
tions affect only the individual. A number of patents have issued with
claims drawn to methods of gene therapy of somatic cells, but only a very
few have issued that may encompass gene therapy involving germ line
cells. It appears that the PTO is being very cautious in allowing claims
drawn to gene therapy of the human germ line. One such patent that is-
sued, U.S. Patent No. 6,677,311 to Evans et al. and assigned to the Salk
Institute for Biological Studies, is drawn to methods of inhibiting growth
or causing death of a tissue type or cell line, including germ cell line, of an
intact organism into which is introduced a genetic construct selectively
operable in the tissue type or cell line and that upon induction converts a
latent toxin into a cell toxin, thereby selectively and negatively affecting
cell growth. It may be more difficult for the PTO to deny such inventions
on grounds of utility and morality, particularly in view of the potential
medical benefits to patients suffering from inheritable genetic diseases. On
the other hand, without the incentive provided by secure patent protection
to invest in the costly and time-consuming research to create new medical
treatments, development of vectors and other compositions useful in hu-
man germ line gene therapy might be discouraged. Critics of genetic ther-
apy could view this inhibition of development as a way to protect the
natural evolution of human genetics. Of course, the PTO continues to be
on a firmer legal footing in refusing to issue any patent claims drawn to
compositions that could include humans, since the Thirteenth Amend-
ment to the U.S. Constitution precludes ownership by one person of
another.
Along these related lines of public policy, there is concern over the pat-
enting of expressed sequence tags and single-nucleotide polymorphisms,
which are partial genetic sequences. Many critics of the patenting of ge-
netic sequences view patent protection of large numbers of partial genetic
sequences as interfering with scientific research by impeding the free ex-
change of materials and information, although many patent applicants also
make their genetic sequence databases accessible. Others have expressed
concerns that the commercialization of human genetic sequences raises
ethical issues. The U.S. Supreme Court in a recent decision (Association of
Molecular Pathology et al. v. Myriad Genetics, Inc. et al.; 133 S. Ct. 2107 [ June
13, 2013]) held that naturally existing segments of DNA are not patentable
312 Chapter 9
to carefully compare the invention with the prior art. This applies to pros-
ecution of any patent application drawn to new forms of technology, where
few, if any, issued patents constitute the prior art. Typically, scientific arti-
cles or conference presentations will serve as the best prior art until the
technology field matures to the point that issued patents serve as prior art
to future applications. Therefore, it is in the best interests of inventors or
applicants to disclose to the PTO during prosecution of their application
relevant printed publications (as well as any other considerations as to the
patentability of the claimed invention, including any offers for sale, public
use or descriptions, or patenting by others of the claimed invention) so
that any patent that issues will have been well examined over the best prior
art available.
The patent system in the United States balances disclosure of new
inventions to promote progress and innovation against the incentive of
reward to inventors. Several reports published in 2003 and 2004 called
for a number of changes in the patent system to improve on this “balanc-
ing act.” One report published in 2003, by the Federal Trade Commis-
sion (FTC), a federal agency responsible for promoting competition, is
entitled To Promote Innovation: The Proper Balance of Competition and Pat-
ent Law and Policy. This report examines ways to improve the patent sys-
tem. Competition policy and patent policy are two federal policies that
have a great influence on innovation. Innovation is also greatly influ-
enced by scientific research and development programs conducted in ac-
ademic, government, and private laboratories. The National Academy of
Sciences has also studied the effects of the patent system on the U.S. re-
search and development effort. In 2004, it published A Patent System for
the 21st Century. This report makes several recommendations to improve
patent quality and promote innovation. For example, one of the corner-
stones of the AIA is the postgrant review of patents, similar to the oppo-
sition proceeding in Europe. Anyone can file a request asking that the
patent office review one or more specific patents to ensure they each
meet the novelty, nonobviousness, and utility the law requires. A second
suggestion is the greater harmonization among the U.S., European, and
Japanese patent regimes. The AIA provides for a first-to-file system as is
used in the rest of the world.
The FTC published another study in 2011, The Evolving IP Marketplace:
Aligning Patent Notice and Remedies with Competition. This FTC report “rec-
ommends improvements to two areas of patent law: policies affecting how
well a patent gives notice to the public of what technology is protected and
remedies for patent infringement.” For instance, better notice to the pub-
lic follows claims that are drafted in clear terms and that are well supported
by the patent’s written description section. A claim should not fail to give
Research Data and Intellectual Property 315
notice of what the invention is, much like a poorly lit traffic sign should
not fail to give clear directions to drivers.
There are several remedies available to a patentee who successfully sues
an infringer. These include royalties and injunctions. The former rep-
resents monetary payment to the patentee, while the latter is an order by
the court preventing the infringer from infringing in the future.
Seeking a Patent
To obtain a patent in the United States, one files a patent application with
the PTO in Washington, DC (the main office complex is physically lo-
cated in Alexandria, VA, with regional offices in Detroit, Dallas, Denver,
and Silicon Valley). Most patent applicants file and prosecute their appli-
cations electronically. Prosecution of a patent application generally takes
from 1 to several years. In some fields of technology, particularly biotech-
nology, it may take from 3 to 5 or more years before the patent is granted.
Patent applications may be prepared and prosecuted before the PTO by
registered patent attorneys or registered patent agents. While the inven-
tor is always entitled to prepare and prosecute on his or her own behalf,
no one else may represent the inventor before the PTO unless he or she
is admitted to practice before the PTO. The requirement for patent at-
torneys or agents to be registered by the PTO is to ensure that only qual-
ified practitioners represent inventors. Patent prosecution procedures are
highly regulated, with myriad rules, regulations, and deadlines. The fail-
ure to meet a deadline may cause the applicant to lose his or her right to
obtain a patent. Generally, in the field of biotechnology, an uncompli-
cated patent application (e.g., utility patent) prepared by a law firm may
cost from $10,000 to $15,000. In contrast, a provisional patent applica-
tion, similarly prepared, may cost significantly less. However, if a provi-
sional application is poorly prepared and not fully enabling for the
invention as claimed in the later filed regular utility application, the pro-
visional application may be a waste of time and money and result in the
loss of patent rights. Submission of a patent application is no guarantee
that a patent ultimately will be issued.
The usual first step in the preparation of filing a patent application is
for the inventor to file an invention disclosure with the inventor’s em-
ployer or patent attorney. This is key to securing protection of intellectual
property in a patent. Invention disclosure forms vary from institution to
institution. The scope of information required by these documents is ex-
emplified by the information required on the invention disclosure used at
Virginia Commonwealth University (Office of Vice President of Research,
316 Chapter 9
Conclusion
Intellectual property law has always been relevant to scientific research. Un-
derstanding and honoring copyright is a major part of the culture of scien-
tific publication and other types of communication. Copyright law also has
significant implications in Internet use and in the protection of source code
and computer applications. The ability to protect intellectual property by
patenting has been a driving force in the application and commercialization
of basic research. In today’s global economy, no existing or new area of tech-
nology can truly prosper and have its maximum impact without the benefit
of intellectual property law. This is especially true for the biomedical and
318 Chapter 9
Discussion Questions
Case Studies
sensitive data that can potentially raise genealogical issues for descendants
who live in the area. Dr. Moore includes some of these data in the first
draft of a manuscript he is preparing for submission to a prestigious, peer-
reviewed archaeological journal. In addition, the city’s historical society
museum has found out about Dr. Moore’s discovery and has asked him to
display the artifacts from the dig, including some of the pages of the diary.
As he edits his draft and considers the museum’s request, he becomes both-
ered by certain aspects of his work and the direction it is going. Some of
the descendants of people mentioned in the diary are now significant con-
tributors to Western Research Institute. He is pondering several questions.
Who owns the diary? Should the discovery of the diary be disclosed to the
descendants? Is the decision to provide materials to the museum his alone?
Are there conflict-of-interest issues looming in this scenario? He comes to
you for advice. What do you tell him?
9.4 A postdoctoral fellow and his mentor have coauthored a paper de-
scribing their research results. This paper appears as a preliminary
report in a copyrighted monograph. One of the figures in the paper is a
computer-generated graph that describes data on a series of cellular growth
curves. The postdoctoral fellow and mentor are now preparing a major
paper for submission to a peer-reviewed journal. They both agree that the
320 Chapter 9
growth curve data in the monograph article are crucial to the story they
are telling in the present manuscript. Accordingly, they decide that this
same figure must be included in their present writing. Because they are
aware of potential copyright violations, they generate the exact same figure
using different typeface fonts and different line thicknesses for the ordi-
nate and the abscissa. They have decided that since this is not the exact
same figure that appeared in their monograph article, the use of it will not
constitute a copyright infringement. They also plan to indicate in their
manuscript that this figure has been “adapted from” the one initially pub-
lished in the monograph article. Comment on what these authors are do-
ing. Do you view it as copyright infringement? If so, are there conditions
of modification of tables or figures that would sufficiently change them in
a way that avoids copyright infringement?
9.5 Dr. Sophia Mondello has been invited by Dr. Peter Cook to write a
chapter on protein structure. Dr. Cook is editing an introductory
biochemistry text to be published by the Dawson Publishing Company.
Dr. Mondello is paid a one-time honorarium of $750 for her chapter. She
signs a property transfer agreement assigning the copyright for her manu-
script to the publishing company. The book does exceptionally well in its
first edition, and Dr. Cook signs a contract with Dawson Publishing to edit
a second edition. Because Dr. Cook was not happy with Dr. Mondello’s
original chapter, he invites Dr. Hanah Saleem to write the protein struc-
ture chapter for the second edition. Dr. Saleem writes the chapter using
three illustrations taken from Dr. Mondello’s original chapter. She also in-
cludes several of the end-of-chapter problems written by Dr. Mondello.
Most of the text of the second edition chapter was written by Dr. Saleem,
but there are several instances where parts of paragraphs are verbatim cop-
ies of those from Dr. Mondello’s original chapter. Dr. Cook advises her
that this is acceptable because Dawson Publishing holds the chapter copy-
right and has given her explicit permission to use any and all of the original
content. When Dr. Mondello inspects a copy of the published second edi-
tion, she becomes incensed. She tells you she plans to file scientific mis-
conduct charges against Dr. Saleem. Comment on both the legal and
ethical issues of this case. What advice will you give Dr. Mondello?
articles appearing in the online journal. She cautions them that they should
make copies only for their personal use in order to be consistent with the
fair use doctrine of copyright law. Some of Dr. Hefner’s trainees regularly
peruse the online journal and print papers for use in their research. Others
in her group refuse to use the online journal, arguing that such a practice is
different from using the printed journal to make a photocopy for their
personal use. Do you agree? Do you think that Dr. Hefner’s policy is legal?
Is it ethical? Explain the rationale for you conclusions.
9.8 Dr. Ruby Gopal, a new faculty member in the chemistry depart-
ment, is assigned the directorship of the laboratory safety course.
The course has no syllabus, and over the next 2 years Dr. Gopal writes a
complete syllabus containing useful reference material, well-documented
procedures, and problem sets. She publishes a website that contains all the
syllabus material in a useful format. During her fourth year as an assistant
professor, her chair, Dr. Brenda Latrell, tells her that her faculty contract
will not be renewed. Brenda explains that the department is losing a posi-
tion because of budgetary cutbacks and Ruby’s position must be eliminated
in order to balance the budget. Ruby is very upset but lands a new job at
another university. She removes the course syllabus from the university
computer and uses it in a comparable course at her new institution. The
next year, Dr. Latrell decides to teach the laboratory safety course and in-
tends to use Dr. Gopal’s electronic syllabus. She is surprised to find it miss-
ing from the university’s computer. She learns that Dr. Gopal has taken all
the files for the syllabus website. Dr. Gopal claims she holds the copyright
and that the university can license the site from her for a fee of $2,500 per
year. Dr. Latrell is angered by this and reminds Dr. Gopal that she assigned
her the course directorship; thus, she considers the website as being done
on a work-for-hire basis. Dr. Latrell affirms that her institution holds the
copyright on the laboratory safety course website. Comment on the legal
322 Chapter 9
Authors’ Note
This chapter does not purport, nor is it intended, to provide legal advice.
The reader is advised in all instances to seek advice from competent legal
counsel to ascertain his or her legal rights regarding intellectual
property.
Some of the cases in this chapter have solutions that impinge on intel-
lectual property law. Discussants are cautioned against assuming that
their proposed solutions to these cases— based on reading and class
dialogue—may be legally definitive. Typically, such cases that require le-
gal solutions would depend on the analysis of all facts and consideration
of current law. This is usually not possible in the scientific integrity class-
room. The cases present limited fact patterns designed to provoke dis-
cussion based on the general outline of intellectual property law discussed
in this chapter.
Resources
Print
Online
Copyrights
The website of the U.S. Copyright Office contains much general infor-
mation about copyrights as well as a search engine for finding copyright
registrations:
http://www.copyright.gov/
Data sharing
Data Sharing Regulations/Policy/Guidance Chart for NIH (National In-
stitutes of Health) Awards:
http://grants.nih.gov/grants/policy/data_sharing/data_sharing_chart.doc
The NIH’s Frequently Asked Questions about Data Sharing Web page
includes the definition of “final research data” and other important contex-
tual information on research data and data sharing:
http://grants.nih.gov/grants/policy/data_sharing/data_sharing_faqs.htm#898
The NIH Data Sharing Policy and Implementation Guidance Web page
includes sample data sharing plans:
http://grants.nih.gov/grants/policy/data_sharing/data_sharing_guidance.htm
NIH Grants Policy Statement, which contains the data sharing policy
(Section 8.2.3.1):
http://grants.nih.gov/grants/policy/nihgps_2010/nihgps_ch8.htm#_Toc271264950
The 2011 report The Evolving IP Marketplace: Aligning Patent Notice and
Remedies with Competition can be accessed at
http://www.ftc.gov/reports/evolving-i p-m arketplace-a ligning-p atent-n otice
-remedies-competition
Freedom of information
The National Freedom of Information Coalition website is maintained by
“a nonpartisan alliance of citizen-driven nonprofit freedom of information
organizations, academic and First Amendment centers, journalistic socie
ties and attorneys.” This site contains current information on Freedom of
Information Act issues.
http://www.nfoic.org/
Patents
Information on patents and other forms of intellectual property can be
found at the website of the U.S. Patent and Trademark Office (PTO):
http://www.uspto.gov
Patent resources may be found at the site offered by the law firm of
Oppedahl and Larson:
http://patents.com/resources
Access to the U.S. PTO site is free and permits searching and downloading
of full-text (or image) copies of U.S. patents and published applications:
http://patft.uspto.gov/
Trademarks
A search engine for trademarks can be found on the U.S. PTO home page
under “Trademarks”:
http://www.uspto.gov/
Glossary
Civil misappropriation Taking and using the property of another without per-
mission for the sole purpose of capitalizing unfairly on the goodwill and reputation
of the property owner.
Common law Generally refers to principles of law developed through litigation
in the courts, rather than statutes enacted through the legislative process.
Contract law Subset body of law developed as common law and statute that re-
lates to agreements between parties, including rights and obligations of parties.
Copyright A property right over intangible intellectual property concerning orig-
inal works of authorship fixed in any tangible medium of expression.
Derivative work Work that is compiled by the author from preexisting works;
a copyright to a derivative work extends only to that material contributed by the
author and not to the preexisting work.
Fair use Statutory protected form of noncommercial use of work under copy-
right that includes use of work for purposes of criticism, comment, news reporting,
teaching, scholarship, and research.
Freedom of Information Act Statute requiring U.S. government agencies to
provide upon request documents in the possession of the agency and those whose
research is supported under a federal funding agreement and all research data pro-
duced therefrom, not otherwise exempted from release under statute (5 U.S.C.
§551 et seq. [1977 and Supp. 2002]). There are nine categories of exemptions that
are intended to protect the release of sensitive information.
Grantee Institution, organization, individual, or other person designated in
the grant; the legal entity to whom a grant is awarded. In the context of federal
Research Data and Intellectual Property 327
Introduction
Scientific Integrity: Text and Cases in Responsible Conduct of Research, 4th ed.
by Francis L. Macrina
© 2014 ASM Press, Washington, DC
doi:10.1128/9781555818487.ch10
329
330 Chapter 10
Published works on the topic of scientific record keeping can aid the
seasoned investigator and trainee alike. Howard Kanare’s Writing the Lab-
oratory Notebook provides a thorough and technical presentation on this
subject. Although written in 1985, much of Kanare’s observations and ad-
vice hold true today. Kathy Barker’s At the Bench: A Laboratory Navigator
devotes an entire chapter to laboratory notebooks and record keeping. Ad-
ditionally, it contains chapters on laboratory setup and organization that
are relevant and useful. A monograph produced by the Howard Hughes
Medical Institute and the Burroughs Wellcome Fund titled Making the
Right Moves (2nd edition) also devotes a chapter to data management and
laboratory notebook keeping. Finally, Internet searches can be used to lo-
cate both university and research institute guidelines and policies that deal
with scientific record keeping.
Kanare defines and describes the laboratory data book as “a bound collec-
tion of serially numbered pages used to record the progress of scientific
investigations. . . . It contains a written record of the researcher’s mental
and physical activities from experiment and observation, to the ultimate
understanding of physical phenomena.” Such records provide the platform
for analysis and interpretation of results obtained in the field or the labora-
tory. They are the basis for scholarly writings, including reports, grant and
patent applications, journal articles, and theses and dissertations. Labora-
Scientific Record Keeping 331
tory data books are the definitive source of facts and details. Good record
keeping fosters the scientific norms of accuracy, replication, and reliability.
Corroboration and verification of scientific results using primary data con-
tained in a laboratory data book may involve individuals other than the
primary data book keeper. A scientist or scientist-trainee may take over a
project, and it will be necessary for him or her to understand precisely the
laboratory data book contents in order to continue the work. Thus, a spe-
cific data book may become a key research tool for someone else in the
laboratory group, or even someone outside the laboratory or the institu-
tion. This makes clarity and completeness of the laboratory data book es-
sential to its usefulness. A properly kept data book can be a teaching tool as
well. In reviewing the pages of a data book with an experienced investiga-
tor, a trainee may learn how that scientist formulates questions, designs
experiments, and troubleshoots problems.
Proper data book keeping also has legal implications. Funding agencies
like the National Institutes of Health (NIH) may audit and examine rec
ords that are relevant to any research grant award. It follows that recipients
of research grants have an obligation to keep appropriate records of exper-
imental activities even though funding agencies seldom impose require-
ments or provide guidance about this. Providing primary research data is
often a component of the approval process for new drugs or medical appli-
cations (e.g., data submitted to the U.S. Food and Drug Administration
[FDA]). And record-keeping requirements for this type of research are
usually explicit. Failure to conform to such specifications can compromise
the validity of the data and the utility of the research. Finally, scientific re-
cord keeping is critical to proprietary matters arising from the research. As
one seeks the protection of intellectual property by applying for a patent
(see chapter 9), it may become necessary to disclose data book contents to
the patent examiner. This disclosure might be related to requests for addi-
tional supporting data, dates of experiments or discoveries, verification
that the records have been properly witnessed, or proof of reduction to
practice. Properly kept data books continue to be important after a patent
is issued. Patents can be legally challenged once they are issued. Litigation
involving these challenges may require that original data books be in-
spected as part of the legal proceedings. Patents in whole or in part can be
nullified as the result of such legal activities.
Finally, scientific records play a role in the investigation of allegations
of research misconduct. In conducting investigations into allegations of
research misconduct, the National Science Foundation Office of Inspector
General considers the following in assessing laboratory data books and
records.
Completeness. The record should describe all the activities of the re-
searcher, not just the “successful” ones.
332 Chapter 10
Defining Data
What do we mean by data? Simply stated, data are any form of factual in-
formation used for reasoning. Data take many forms. Scientific data are
not limited to the contents of data books. Much of what we would call data
contained in data books is commonly classified as being intangible. That is,
data books may contain hand script or affixed typescript that records and
reports measurements, observations, calculations, interpretations, and
conclusions. The term “tangible data,” on the other hand, is used to de-
scribe materials such as cells, tissues or tissue sections, biological speci-
mens, gels, photographs and micrographs, and other physical manifestations
of research.
Data are said to have authenticity and integrity. Authentic data repre-
sent the true results of work and observations. When data deviate from this
standard because of carelessness, self-deception, or deliberate misrepre-
sentation, they lose their authenticity. Integrity of data is dependent on
results being collected using well- chosen methods carried out in the
proper manner.
During the course of experimentation, some kinds of data evolve into
different forms. Let’s say you set out to do an electrophoretic analysis of a
protein mixture. Your experiment results in a polyacrylamide gel slab in
which a mixture of several proteins has been electrophoretically separated
Scientific Record Keeping 333
in a single lane. One lane of the gel contains reference proteins of known
molecular weight and concentration. You visualize the protein components
by staining with Coomassie blue dye. Then you desiccate the gel and seal
it in a clear plastic envelope. You photograph the gel, and the resulting
print and negative are placed in plastic sleeves and taped into your data
book; the desiccated gel is also taped to a data book page. Next, you calcu-
late the apparent molecular weights of the proteins by comparing their
migration relative to the standards. You do this by making measurements
on both the gel and the photograph. In both of these cases, the data be-
come transformed into handwriting in the data book. Then you enter your
measurements into a computer, which generates a numerical data set that
is fixed as a printed copy; it is also maintained as an electronic file. You use
a computer algorithm to determine the apparent molecular weights, and
you compare the results obtained by the different methods. Can you as-
cribe value to the various forms of the data that have come from this work?
Is the gel itself the most important piece of data? Or could the gel be dis-
carded once it is recorded photographically? This scenario can be made
more complex. For example, you scan the photographic negative using a
digital scanner, resulting in its image being captured in an electronic file,
which can then be printed. You use these electronic data to quantitate the
proteins by comparing them with the concentrations of the proteins pres-
ent in a control lane on the gel. You also use these data to make measure-
ments electronically, enabling the program to compute the molecular sizes
of the proteins.
All the forms of the data being considered—desiccated gel, photo-
graphic, electronic, and written or printed formats—are legitimate. Elec-
tronic technologies continue to change how data are acquired, handled,
and stored. The questions of identifying legitimate data strongly affect
data analysis. Some forms of data may be better used for measurements
and calculations than others. In the example given, it can be argued that
measurements made from an optically or electronically generated image
are more uniform from experiment to experiment than are those taken
directly from the gel. This example also raises issues about data storage. Is
it better to emphasize the long-term storage of desiccated gels or to rely
exclusively on a photographic or electronically derived image?
Terms like “raw data,” “original data,” and “primary data” are often used
by scientists, but their definitions are elusive and their use can be confus-
ing. The changing face of data collection, now strongly affected by elec-
tronic technology, requires careful consideration of what constitutes
legitimate and valid data. Thus far, definitions of scientific data have been
of limited scope and usefulness. Yet the definition of data is central to sci-
entific integrity. Scientists need to recognize the importance of multiple
data forms and to strive to clarify and define their importance. When
334 Chapter 10
Data Ownership
Let’s revisit the topic of data ownership, which was discussed in chapter 9.
It’s safe to say that the details and implications of data ownership are not
foremost in the minds of most researchers when they are writing grant
applications or doing experiments. However, many funding agencies that
sponsor research are clear on the issue of data ownership. As the primary
and largest funding agency for biomedical research in the United States,
the NIH, under the aegis of the U.S. Public Health Service, provides guid-
ance on data ownership related to work supported by its research grants.
As a matter of both policy and practice, the Public Health Service recog-
nizes the grantee institution as the owner of the data generated by the
NIH-funded research. Most NIH research grants are made to institutions,
not to individuals. The individual who submits the grant on behalf of the
institution is called the principal investigator. In practice, the principal in-
vestigator is the steward of the federal funds and of all aspects of the re-
search that are sponsored by that support. The principal investigator
assumes the primary responsibilities for data collection, recording, storage,
retention, and disposal. Grantee institutions (e.g., universities) usually op-
erate so as to give maximum latitude and discretion to principal investiga-
tors. However, the discharge of these duties does not impinge upon, nor
should it cloud, the issue of data ownership. For example, if the principal
investigator resigns his or her position to take another one at a different
university, the grant award, the equipment purchased from the grant funds,
and all of the data are required to remain at the institution that initially
received the award. However, permission may be sought to transfer the
grant award, some or all of the equipment, and the data to the principal
investigator’s new institution. The process to do this is formal and requires
mutual consent of the involved parties: the granting agency, the current
grantee institution, and the proposed grantee institution. If for some rea-
son an agreement is not reached, the initial grantee institution can keep
the award, assuming it identifies a new principal investigator who is ac-
ceptable to the granting agency. The principal investigator as an individual
never legally has ownership of the data. The transfer of data ownership,
when it occurs, is between grantee institutions.
In summary, neither the principal investigator nor any member of the
laboratory research team owns the data generated under an NIH research
grant. This is generally true for awards from federal agencies. Informing
trainees and staff about practical issues of record keeping is the responsi-
bility of the principal investigator.
Scientific Record Keeping 335
The NIH requires that data obtained under the aegis of an NIH grant be
retained for 3 years beyond the date of the final financial expenditure re-
port. Requirements for the amount of time research data must be retained
may vary for various public and private funding agencies. Because of this, it
would be impractical, if not impossible, for a major research university to
organize, implement, and maintain a uniform data storage system for all of
its research projects. Such logistical problems at most universities and re-
search institutions place the responsibility for the storage of data squarely
on the principal investigator. Therefore, it is essential that investigators
have a clear understanding of their granting agency’s policies governing
data ownership issues and data retention. Furthermore, investigators need
to be aware of relevant state laws regarding the retention of data, because
they usually override federal ones. For example, the Commonwealth of
Virginia mandates that data gathered by state agencies be retained for 5
years, thus extending the NIH requirement for scientists at state-supported
universities.
Paper
Kanare’s discussions on the quality of data book paper are thorough and
technical and may be summarized as follows. Make sure your data are re-
corded on acid-free paper as the best insurance for permanence. Selection
of data books composed of paper that is considered permanent can be
aided by consulting data book suppliers or manufacturers. Often, paper
composition is printed on the bound data book cover. The longevity of
laboratory data books is facilitated by proper storage. Strong light sources
(especially sunlight), high humidity, chemical fumes (in exhaust hoods), ex-
tremes in temperature, and excessive dust can have unwanted and undesir-
able effects on stored laboratory records.
ballpoint pen with black ink is best for scientific note keeping. Colored
inks are not desirable, because their decomposition promoted by light is
significant compared with black ink. However, varying the color of inks
when drawing diagrams, for example, may be essential in some types of
work. Inventories of pens for laboratory use should be sufficient for short-
term (a few months) use. Long-term storage of ballpoint pens is undesir-
able because of ink component partitioning within the ink cartridge, which
can result in problems of ink flow.
Record-Keeping Practices
Drawing from references of the types cited previously, experience, and ob-
servation, the following is an overview of laboratory record-keeping prac-
tices useful in developing record-keeping policies.
Data books
The case for using permanently bound laboratory data books with con-
secutively numbered pages has been made previously, but the discretion
of the principal investigator should prevail in selecting specific data book
types and mandating their use. Hereafter in these discussions, use of
bound data books will be assumed. Some investigators like to control the
distribution of data books. For example, data books are given out as
needed by the principal investigator or the lab manager. At the time of
distribution, a record is made of the date, data book user, and project; at
this point, the data book can be coded with a designation (e.g., a volume
number), which will allow for its tracking while in use or storage. This
strategy has merit in laboratories where there are multiple trainees and
staff working on a variety of projects, funded from different sources.
Data book users should clearly understand the lab policy for data book
storage, retention in the lab, and any requirements for duplicating data
book pages and other forms of data.
338 Chapter 10
Organization
The first several pages of an individual’s data book should be reserved for a
table of contents. The first entry before beginning the table of contents
should consist of the name of the data book user and other relevant infor-
mation; especially for work with potential proprietary implications, the
location (room, building, institution) of the laboratory in which the exper-
iments are being performed is recommended. Financial sponsorship
should be identified by stating the title of the grant proposal, its agency
identification number, dates of support, and the name of the principal in-
vestigator. Experiments listed in the table of contents should have concise
but descriptive titles. The numbering of experiments chronologically facil-
itates cross-referencing experiments. A glossary of abbreviations, symbols,
or common designations may be included after the table of contents or,
alternatively, can be listed at the end of the data book. Leave enough space
for this information in order to be able to make additions to the glossary
throughout the project.
The maintenance of a master data book log may be desirable. This cen-
tral record (essentially a standard data book or perhaps even a computer-
based word-processing or database algorithm) contains a listing of all
experiments performed by the research team. Individuals are responsible
for maintaining the log by entering experiment titles, dates, investigators’
names, and the location of relevant data. A second type of laboratory-based
reference resource is the methodology notebook. These notebooks are a
compendium of all standard laboratory methodology. Compilation of
these books works best when it involves all laboratory members. Experi-
mental methods should be described in sufficient detail to be useful even
to the novice investigator. A printed copy of the complete book (in this
case, loose-leaf or comparable binders are acceptable) can be kept in a cen-
tral location, or duplicated copies can be distributed to lab members. Alter-
natively, copies of the methods notebook can be distributed in electronic
format for the use of lab members. If a laboratory methods notebook is to
be kept, it is critically important that the master copy, controlled by the
principal investigator or lab manager, be updated regularly—perhaps on a
yearly basis. Again, this can be done as a group effort, benefiting from im-
provements and refinements made by individuals using the techniques.
Updated copies of new methodology notebooks should be distributed to
replace old versions. The previous version of the master methodology log
should be stored in an unaltered state. This allows for methods that have
been updated or discontinued to be saved; referring back to methods, even
discontinued ones, is sometimes necessary. These methods should be ar-
chived so that the date of revision or replacement of the method is obvi-
ous. Even if a central methodology book is maintained in the laboratory, it
is a good idea that the data books of individual investigators describe
Scientific Record Keeping 339
regularly used procedures. These can be transcribed into the data book.
Alternatively, typed copies can be prepared on high-quality paper and at-
tached to the pages of the data book using archival-quality tape or glue.
Obviously, any specialized techniques or methods used in research projects
(which might not be appropriate for a central methodology book) should
be recorded in the individual’s data book.
Finally, consider a methods book kept separately by each member of the
laboratory. In other words, investigators compile their own methods books
and modify them as needed, leaving the original copy with the rest of their
data books when they leave the lab. This might be practical in a laboratory
where strikingly different methods are used in various projects. All of the
above considerations apply to the maintenance of such a methods book.
Decisions relating to whether to use centralized or decentralized record
keeping should be made by the laboratory leader. Modern biomedical re-
search frequently involves methodologies and interdisciplinary research
that require the centralized organization of methods commonly used by
the group. Such organization and maintenance facilitate the teaching of
novice trainees and staff, ensure quality control, and help in the trouble-
shooting of technical problems. Reference manuals describing common
methodologies and reagents have been published and are likely to be use-
ful to researchers in the biomedical and life sciences. A growing number of
published laboratory manuals are entering the marketplace each year. Cold
Spring Harbor Laboratory Press publishes a large number of specialized
laboratory manuals that cover topics from molecular cloning to cell imag-
ing to bioinformatics. These titles can be found by searching its website
(http://www.cshlpress.com/) using “laboratory manual” as the keyword
phrase. Finally, the Nature Publishing Group publishes an online journal
called Nature Protocols (http://www.nature.com/nprot/index.html). This
journal publishes protocols in what is termed a “recipe style,” providing a
source of information allowing the direct use of methods by readers. Pub-
lished protocols cover a wide range of topics in the biomedical and life
sciences.
collected on tape, printouts, thermo fax paper, or any paper stock of low
quality should be photocopied onto high-quality paper before being glued
or taped into the data book. Alternatively, such outputs can be digitally
scanned, printed, and affixed to the data book page. A record of the name
and location of the digital file also should be described in your data book,
as mentioned in the next paragraph.
Certain materials that contain or represent data cannot be practically
included in the laboratory data book. These include, for example, oversize
photographic or autoradiographic material, magnetic media, embedded
specimens or tissues, and some data obtained by light or electron micros-
copy. For proper storage of these materials, one should consider such fac-
tors as humidity, temperature, light, security, and ease of accessibility. For
example, oversize X-ray films contained in protective sleeves that are ap-
propriately coded can be stored in metal cabinets of some type. Pressed-
board boxes also are useful for storage. Such containers come in varied
sizes and shapes, but only those composed of acid-free materials should be
used. Ordinary cardboard boxes, even those commercially sold for storage
purposes, are inferior and can release damaging acids over time. When
using remote-site storage, it is important that a description of the data
storage system, the storage location, and the coding scheme be described
in your laboratory data book. As a rule, an individual who inspects the data
book should be able to locate all forms of data relevant to the experiments
presented simply by reading its pages. For example, if centrally stored elec-
tron microscope grids or tissue sections cannot be located from reading
the data book, then repeating certain experiments or observations may not
be possible.
For maximum longevity, prolonged storage of data books and related
materials such as photographs, negatives, or oversized documents should
ideally occur under conditions of controlled temperature (65 to 71°F) and
relative humidity (50%). Basements, attics, and poorly ventilated storage
rooms are notoriously bad places for long-term storage of data and data
books.
Format
Investigators should plan how experiments will be recorded in the data
book. Some argue that writing should be concise. Although this is a rea-
sonable guiding principle in data book writing, it should never compro-
mise capturing any part of the experiment. For example, if an observation
requires an explanation that is complex and must be described at extraordi-
nary length, then this should be done without reservation. The same is
true for interpretations and for thoughts on plans for additional work. Pre-
sentation and detail must be complete and comprehensible. All entries in
the laboratory data book should be made legibly.
Scientific Record Keeping 341
should be affixed to the data book page along with a notation of the name
of the electronic image file and its storage location.
In deciding to put a policy in place, the investigator must consider the re-
quirements (if any) of funding agencies and the possibility that applied sci-
ence may emerge from the research.
Where it is a standard practice or required in research laboratories (e.g.,
certain types of corporate-sponsored research or FDA-required good lab-
oratory practices), each and every page of the data book is witnessed. The
witness signs and dates the page of the data book being examined. The
witness must be able to understand the work. The signature may be ac-
companied by a declaration that says “witnessed and understood.” Some
commercially available data books have this declaration and a line or box
for signature and date printed on each page. The witness must not be a
coinventor. In patent prosecution, coinventors are not allowed to corrobo-
rate each other’s work. Thus, selection of a neutral party who is able to
understand the work is needed for appropriate witnessing of scientific data.
Consider, for example, a discovery that grew from a predoctoral research
project. The trainee’s mentor would likely be considered a coinventor and,
thus, should not sign as a witness to the data. Another worker in the same
lab could sign, assuming he or she understood the work but was not in-
volved in it.
It is desirable to record in the data book discussions with others about
the research. These notes should list the times, names of the individuals
talked to, and relevant points of the discussion. This is a good record-
keeping habit that will help trace the investigator’s thinking processes and
provide a prompt when it is time to attribute credit. In addition, should
corroboration of data be needed at some point, tracking down individuals
who can talk about certain experiments is the next best thing to a wit-
nessed data book page. Correspondence to and from colleagues about your
experiments should be recorded in the data book as well. Letters can be
photocopied on high-quality paper and then fixed in the data book using
archival tape or glue. Alternatively, it may be appropriate to make notes
from such correspondence in the data book and then refer to the location
of the letter in a file (print or electronic) that can be easily found by some-
one reading the data book.
Finally, names of individuals who have played any role in your research
need to be entered in the data book along with a description of their contri-
butions. Collaborative researchers fall into this category. Agreements with
collaborators pertaining to research contributions, expenditures on grants,
personnel involvement, and perhaps most important, authorship on papers
should be recorded in the data book. People who have participated in your
research, even on a fee-for-service basis, should be noted in your writing.
Personnel working in institutional core facilities are especially important.
Who was the statistician or bioinformatician who provided needed analyses
of your data, or the core lab technician who did the mass spectroscopy on
346 Chapter 10
xamples of laboratory data book pages. These illustrate the style of a single per-
E
son but exemplify a number of features important to good record keeping. Each
numbered page in the bound data book is dated. The experiment is titled (title and
page are also recorded in the book’s table of contents) and begins with a statement
of the objective. The opening remarks contain a literature citation for reference.
Scientific Record Keeping 349
DNA oligonucleotide primers being used in this experiment are not described at
the sequence level, but the data book page on which this information may be found
is noted. A digitized, computer-labeled image of an ethidium bromide-stained aga-
rose gel has been printed and taped to the page. A series of conclusions are listed,
and modifications for a future experiment are proposed.
350 Chapter 10
Conclusion
The laboratory data book may not always be the central repository for raw
data, but it must be the center of the research data record. No matter what
form the data are in or where the data may be stored, locating and
Scientific Record Keeping 351
understanding the data must ultimately begin with the data book. Research
record keeping requires above-average organizational skills and the disci-
pline to implement them consistently. It’s easy to cut corners or pay little
attention to details of annotation and storage. Failing to record observa-
tions in a timely fashion may lead to inaccuracies. Improperly organized
data may become meaningless to you and to others.
Speaker’s notes provide a useful metaphor for record keeping. Such
notes generally fit into two categories. The first includes short phrases,
words, or occasional sentences that provide triggers for the speaker. The
second category is a verbatim text of the speaker’s remarks—a script of
every word to be spoken during the presentation. There are no abbrevia-
tions, cryptic reminders, or shorthand notations. If the speaker were sud-
denly taken ill, a colleague could easily give the speech. However, it is
doubtful that a colleague could successfully deliver the speech using only
the abbreviated notes. Think about your record keeping in similar terms. A
laboratory data book is inherently more useful as the “verbatim text” of
experimental work. In his book The Cuckoo’s Egg (Doubleday, New York,
NY, 1989), Clifford Stoll lauds the value of a carefully documented data
book. His advice rings true as an axiom of scientific record keeping: “If you
don’t document it, you might as well not have observed it.”
Discussion Questions
1. Do you think that electronic record keeping will either increase or
decrease our ability to detect scientific misconduct? Why or why
not?
2. If an NIH-funded principal investigator takes a new position, does
he have the right to take all of his data and data books with him to
his new institution? If not, what policies or ethical issues apply to
such a situation?
3. What characteristics do you consider essential to the functionality of
an electronic laboratory notebook?
4. Could sloppy and incomplete record keeping ever qualify as scien-
tific misconduct? Explain.
Case Studies
10.4 Professor Astrid Mueller and her postdoc, Dr. Jonathan Rao, have
coauthored a major paper in a prestigious international journal.
After the paper was published, Jonathan left the lab to take a position as a
biotechnology investment analyst. Two years after the paper was pub-
lished, Mueller’s university, a public institution, receives a Freedom of
Information Act (FOIA) request from a national watchdog group, the
Public RCR Institute. The Institute is collecting information to study
“the degree to which researchers adhere to the important scientific stan-
dards of keeping complete and accurate data books and other investiga-
tory records.” The FOIA request contains a list of 10 recently published
papers authored or coauthored by faculty at Mueller’s university. The
Rao and Mueller paper is on the list. The FOIA request asks for copies of
10 randomly selected data book pages associated with each of the listed
publications. The office of the university counsel initiates coordination of
the FOIA request and instructs Dr. Mueller to begin identifying the rele-
vant data book pages. The two relevant data books for the publication
were created by Jonathan. As Mueller reviews the data in the books, she
discovers some major inconsistencies between raw data book records and
the formal presentation of data in one of the tables in the published pa-
per. In fact, she is unable to reconstruct the table to her satisfaction. Rel-
evant data are scattered throughout one of the data books, reflecting their
collection at different times. Some data have been excluded in the con-
struction of the table, but there is no explanation provided as to why. Al-
though she is concerned about the implications this has on the FOIA
request, these concerns pale in comparison to those she has about the
published paper. If someone tries to reproduce results based on the table
in question, how will she be able to defend their data? She comes to you
for advice on how to proceed in addressing this dilemma. What guidance
and advice do you have to offer?
354 Chapter 10
10.5 Bob, your fellow graduate student, comes to you for advice. Bob’s
mentor recently has noticed that he keeps his stained, desiccated
polyacrylamide gels in sealed plastic bags that are taped to the pages of his
data book. Bob considers such gels to be primary data that must be re-
tained in their original form. Bob’s mentor has ordered him to stop doing
this. Moreover, he tells Bob to remove the gels already in his data book.
Bob’s mentor says that polyacrylamide is a neurotoxin and should be dis-
posed of properly. Further, he tells Bob to make black-and-white photo-
graphs of all his previous gels and to retain both the print and negative for
each gel. He says that in the future this practice should be followed for all
acrylamide gel data storage. He says the photographs are to be considered
the primary data and retained in Bob’s data book. Bob disagrees with his
mentor and argues that photographs can be altered and that a desiccated
gel is an accurate representation of the original data. He also argues that
once the acrylamide is sealed in plastic, there is no danger of exposure to
toxic material. Bob’s mentor dismisses these arguments and gives him 1
month to photograph the existing gels and to dispose of them. Bob is very
upset. He thinks his mentor is acting irresponsibly with respect to data
retention. He also feels his mentor is being a bully, by forcing Bob to adopt
his personal preferences. What advice do you give Bob?
name be removed from the author’s byline and reference to her grant be
removed from the acknowledgments. Matt agrees, and the paper is pub-
lished with him as the sole author. The relationship between Matt and Dr.
Amos subsequently deteriorates. Meantime, Dr. Amos enlists her new
postdoctoral trainee, Dr. Juanita Gomez, to repeat the relevant experi-
ments, and her results clearly support that the findings in question are in-
correct. Drs. Amos and Gomez prepare a manuscript reporting this and
ultimately publish their results in Molecular Physiology. Comment on Dr.
Amos’s handling of this situation. What, if anything, would you have done
differently? Does anything described in this scenario meet the definition
of scientific misconduct? Explain.
10.7 A predoctoral trainee under your supervision has had several diffi-
cult years finishing up his dissertation research. He has needed
continual guidance, and his attitude has not been positive. He does not
seem motivated about the work, but you press him almost daily until the
work is completed and the dissertation is finally written. The student turns
in an average defense and informs you that he is leaving science to take a
job in biomedical supply sales. Several areas of the student’s dissertation
need additional work before the research can be written up in manuscripts
for publication. You turn several portions of the dissertation work over to a
competent postdoctoral trainee in your laboratory. Over the course of the
next several weeks, the postdoctoral trainee pursues these new lines of ex-
perimentation. In the process, however, she uncovers several problems
with the data in the dissertation. In fact, a number of experiments cannot
be repeated. Moreover, some of the results obtained are opposite to those
reported in the student’s dissertation. You review the student’s data books
and are unable to find entries that could have been used to construct some
of the tables included in the dissertation. Moreover, other data sets written
into the data book have been used selectively to construct some tables in
the dissertation; i.e., critical points that would have confused analysis were
omitted in the dissertation. After considerable analysis and discussion with
the postdoctoral trainee, you decide that the student has at least falsified
data and possibly fabricated data presented in his dissertation. You have
not yet published any of the work of the student’s dissertation in manu-
script form. However, one published abstract contains accurate informa-
tion that has been authenticated by your postdoctoral trainee. All of the
student’s work was supported by your NIH grant. What actions, if any, will
you take in this situation?
10.9 Dr. Megan Hennessey has collected blood samples from 100 hu-
man patient volunteers to test antibody levels against two differ-
ent viruses. Relevant clinical histories of these patients, corresponding to
the individual samples, are noted in her data book. She has carefully
tagged the tubes with self-adhesive labels and stored them in racks of 20
in the freezer. She assays the samples in three of the five racks and obtains
interesting results. She records her results meticulously in her lab data
book, cross-referencing the antibody values to the clinical patient data.
Megan asks you to witness these data book pages because the results have
implications for the development of an important diagnostic test. You
sign her data book pages as requested. When she opens the freezer to
retrieve the sera in the fourth rack, she makes a disturbing discovery. All
the labels have fallen off the tubes in racks 1 and 2. (She later finds out
she used the wrong kind of self-sticking labels on these tubes, resulting in
their failure to adhere at –70°C.) Megan proceeds to number all the tubes
in racks 1 and 2 by order of their rack location. Then she repeats the an-
tibody assays on these samples. She arranges her resulting data into a
summary table that she compares with her original assays of these sam-
ples. She is relieved that the data compare favorably, and she relabels the
tubes consistent with their original designations. She comes to you for
advice on her actions and asks how, if at all, she should record these events
in her data book. What do you tell her?
Scientific Record Keeping 357
Resources
Print
Barker K. 2005. At the Bench: A Laboratory Navigator, updated ed. Cold Spring
Harbor Laboratory Press, Cold Spring Harbor, NY.
Burroughs Wellcome Fund and Howard Hughes Medical Institute. 2006.
Making the Right Moves: A Practical Guide to Scientific Management for Postdocs
and New Faculty, 2nd ed, p 143–152. Burroughs Wellcome Fund, Research Tri-
angle Park, NC, and Howard Hughes Medical Institute, Chevy Chase, MD.
http://www.hhmi.org/sites/default/files/Educational%20Materials/Lab%20
Management/Making%20the%20Right%20Moves/moves2.pdf.
Canfield MR (ed). 2011. Field Notes on Science and Nature. Harvard University
Press, Cambridge, MA.
Kanare HM. 1985. Writing the Laboratory Notebook. American Chemical Society,
Washington, DC.
Mellick AS, Rodgers L (ed). 2006. Lab Ref: A Handbook of Recipes, Reagents, and
Other Reference Tools for Use at the Bench, vol 2. Cold Spring Harbor Laboratory
Press, Cold Spring Harbor, NY.
Menzel J, Weil P, Bittihn P, Hornung D, Mathieu N, Demiroglu SY. 2013.
Requirement analysis for an electronic laboratory notebook for sustainable data
management in biomedical research. Stud Health Technol Inform 192:1108.
358 Chapter 10
Milsted AJ, Hale JR, Frey JG, Neylon C. 2013. LabTrove: a lightweight, web
based, laboratory “blog” as a route towards a marked up record of work in a
bioscience research laboratory. PLoS One 8:e67460.
doi: 10.1371/journal.pone.0067460. http://www.plosone.org/article/info%3A
doi%2F10.1371%2Fjournal.pone.0067460.
Roskams J, Rodgers L (ed). 2002. Lab Ref: A Handbook of Recipes, Reagents, and
Other Reference Tools for Use at the Bench, vol 1. Cold Spring Harbor Laboratory
Press, Cold Spring Harbor, NY.
Rubacha M, Rattan AK, Hosselet SC. 2011. A review of electronic laboratory
notebooks available in the market today. J Lab Autom 16:90–98. http://jla
.sagepub.com/content/16/1/90.long.
Voegele C, Bouchereau B, Robinot N, McKay J, Damiecki P, Alteyrac L. 2013.
A universal open-
source Electronic Laboratory Notebook. Bioinformatics
29:1710–1712.
Online
Resources from federal agencies
National Cancer Institute Technology Transfer Center’s 2009 Guide for
Keeping Laboratory Records brochure:
http://ttc.nci.nih.gov/pdfs/brochures/Keeping_Lab_Records.pdf
The NSF’s Proposal and Award Policies and Procedures Guide, released in
2013, contains information on data sharing, record retention, and other
topics relevant to this chapter. It is available at
http://www.nsf.gov/pubs/policydocs/pappguide/nsf13001/gpgprint.pdf
Scientific Integrity: Text and Cases in Responsible Conduct of Research, 4th ed.
by Francis L. Macrina
© 2014 ASM Press, Washington, DC
doi:10.1128/9781555818487.ch11
361
362 Chapter 11
the scientist’s attitudes toward patents and secrecy restrictions. It should af-
firm the scientist’s obligations to individuals—to his employer, his associates,
other scientists, and his assistants and graduates—and scientists’ obligations
as a group to other professions.
In this chapter, we will discuss a few topic areas that bear on scientific
research with potential or emerging social agendas. We will begin with a
discussion of the development and use of recombinant DNA (rDNA)
364 Chapter 11
rDNA Technology
Background
In chapters 5 and 6, we discussed oversight mechanisms that ensure the eth-
ical use of humans and animals in research. The Nuremberg Code and the
Declaration of Helsinki provided the prevailing international standards for
human subjects research in the 1950s and 1960s. The Nuremberg Code was
created in response to the atrocities committed by Nazi doctors under the
guise of “experimentation.” Physicians helped write the Code, which pro-
vided critical guidance for the court in the prosecution of the trial. The
Declaration of Helsinki, first promulgated in 1964 by the World Medical
Association, built on the authority of the Code. Both the Nuremberg Code
and the Declaration of Helsinki strongly influenced the U.S. federal laws
that now govern human subjects research. This history featured seminal
events that created public awareness and mobilized scientists, legal infra-
structure, governments, government agencies, and international scientific
organizations. Formal guidance and codes for the use of animals in research
further illustrate the effect of convergence of multiple factors to create a
new ethical culture. The initial passage of the Animal Welfare Act in 1966
followed just months after a Life magazine article described horrific condi-
tions under which commercial breeders maintained their dogs. The public
outcry, together with the speed at which the U.S. Congress acted, was stun-
ning, and the impact on the use of animals in research was lasting. Clearly,
the need to conduct research with human and animal subjects in ethical and
responsible ways emerged as a mandate from both inside and outside of the
research community. In the end, science and society became engaged in an
agenda aimed at ensuring the responsible conduct of research.
The development of rDNA technology and the debate about risks asso-
ciated with its use provide a powerful example of the intersection of sci-
ence and society. Its uniqueness lies in two separate characteristics. The
first is that the discovery of rDNA technology and the ensuing concerns
about the use of this technology were brought into the public domain by
scientists who had a vested interest in its use and success as a research tool.
Second, debate about the use of rDNA technology was robust and wide-
spread, involving scientists, the government and government funding
agencies, and the public. The upshot of the dialogue and debate about the
technology was a regulatory infrastructure designed to monitor certain
Science, Technology, and Society 365
At first blush, one might interpret this passage as ceding the resolution
of challenging research dilemmas to political process. But Berg’s message
does not rule out or dismiss activism on the part of scientists and the scien-
tific community. In fact, the complexity of the issues associated with a
number of modern-day research areas demands the input and involvement
of scientists in whatever means seems appropriate to seek understanding
and resolution. The Asilomar Conference stands as a shining example of
social activism in science. The outcomes of the conference should con-
vince scientists of the importance of public engagement and inspire their
sense of social responsibility, which is, in fact, an obligation. Beckwith and
Franklin Huang point out that the scope of the scientific research enter-
prise today exceeds that at any other time, and that the societal conse-
quences of such research are correspondingly expansive. Echoing earlier
Science, Technology, and Society 371
comments made in this chapter, these authors declared: “It is more neces-
sary than ever that scientists be part of the public conversation that fosters
both an understanding of science and shapes the impact science will have
on society.”
Genetic Technology
Human Genome Project. Since 2003, they have jointly supported interdis-
ciplinary Centers of Excellence in ELSI Research.
Genetic testing
The development of new techniques in molecular biology has fueled a rev-
olution in genetic testing, and testing is now available from preconception
through adulthood. In addition to tests performed by and interpreted by
health care providers, direct-to-consumer testing has also become avail-
able. There has been controversy regarding whether individuals should
have direct access to their own genetic data. Invoking the principle of au-
tonomy, it can be argued that individuals have a right to their own genetic
data. Based on beneficence, others argue that provision of genetic infor-
mation directly to individuals, without the assistance of a health care pro-
vider to interpret the implications, should be prohibited because it has
high risk of harm. These discordant views were exemplified in November
2013, when the U.S. Food and Drug Administration (FDA) issued a warn-
ing letter to the personal genomics company 23andMe that the company’s
Personal Genome Service (PGS) was classified as a medical device, and
that the company “must immediately discontinue marketing the PGS until
such time as it receives FDA marketing authorization for the device.”
23andMe complied, but stated on its website, “We remain firmly com-
mitted to fulfilling our long-term mission to help people everywhere have
access to their own genetic data and have the ability to use that informa-
tion to improve their lives.”
Genetic tests can pose difficult dilemmas that may not be readily appre-
ciated by scientists designing such screening tools or the consumers who
use them. The FDA cited such concerns in the November 2013 warning
letter to 23andMe:
Most of the intended uses for PGS listed on your website, a list that has
grown over time, are medical device uses under section 201(h) of the F[ood],
D[rug], &C[osmetic] Act. Most of these uses have not been classified and
thus require premarket approval or de novo classification, as FDA has ex-
plained to you on numerous occasions.
Some of the uses for which PGS is intended are particularly concerning,
such as assessments for BRCA-related genetic risk and drug responses (e.g.,
warfarin sensitivity, clopidogrel response, and 5-fluorouracil toxicity) be-
cause of the potential health consequences that could result from false posi-
tive or false negative assessments for high-risk indications such as these. For
instance, if the BRCA-related risk assessment for breast or ovarian cancer
reports a false positive, it could lead a patient to undergo prophylactic sur-
gery, chemoprevention, intensive screening, or other morbidity-inducing
actions, while a false negative could result in a failure to recognize an actual
risk that may exist. Assessments for drug responses carry the risks that pa-
tients relying on such tests may begin to self- manage their treatments
through dose changes or even abandon certain therapies depending on the
374 Chapter 11
outcome of the assessment. For example, false genotype results for your
warfarin drug response test could have significant unreasonable risk of ill-
ness, injury, or death to the patient due to thrombosis or bleeding events that
occur from treatment with a drug at a dose that does not provide the appro-
priately calibrated anticoagulant effect. These risks are typically mitigated
by International Normalized Ratio (INR) management under a physician’s
care. The risk of serious injury or death is known to be high when patients
are either non-compliant or not properly dosed; combined with the risk that
a direct-to-consumer test result may be used by a patient to self-manage,
serious concerns are raised if test results are not adequately understood by
patients or if incorrect test results are reported.
In most cases, the ability to identify risks associated with particular gen-
otypes precedes understanding of how the genotype informs effective
treatment. It might be argued that providing individuals with knowledge
of the potential for disease promotes autonomy; however, a person’s wel-
fare may or may not be enhanced by knowing that he or she has a predis-
position to a disease for which there is currently no preventive therapy and
no cure. It is also not possible to predict what future therapies for manage-
ment or cure of disease may be developed or when these therapies will be
available to patients. Among individuals with the same genotype, quality of
life, disease course, and severity can vary substantially. Genetic informa-
tion is often erroneously applied, and there have been ongoing concerns
related to discrimination based on genetic information. As described
above, GINA, HIPAA, and the Affordable Care Act contain specific pro-
tections related to the use of individual genetic information.
Valuable data can be obtained by collection and analysis of DNA from
large cohorts. Genome-wide association studies scan the genomes from
many different people to identify genetic markers that can be used to pre-
dict the presence of a disease. NIH-funded genome-wide association stud-
ies are required to submit these data to a repository at the NIH in order
that the information can be made available for additional research. At the
February 2012 inauguration of the NIH-sponsored Alzheimer’s Disease
Sequencing Project (ADSP), NIH director Francis S. Collins said, “Pro-
viding raw DNA sequence data to a wide range of researchers proves a
powerful crowd-sourced way to find genomic changes that put us at in-
creased risk for this devastating disease. The ADSP is designed to identify
genetic risks for late-onset of Alzheimer’s disease, but it could also discover
versions of genes that protect us. These insights could lead to a new era in
prevention and treatment.”
than that for which it was originally intended and at a time removed from
the collection and consent process. Concerns regarding subsequent re-
search use of supposedly deidentified biological specimens are exemplified
in Rebecca Skloot’s book The Immortal Life of Henrietta Lacks. HeLa cells, a
prominent cell line in research, were derived from a sample of cervical
cancer cells taken from Henrietta Lacks, who died of cervical cancer in
1951. The cells were obtained without her knowledge or permission. HeLa
cells have been a cornerstone of cell and biomedical research for decades
and are the most widely used cell line in the research community. Henri-
etta Lacks was publicly identified in the research community as the
source of the cells in 1971, although her family did not learn about the
existence of the cell line derived from her cervical sample until 1973. In
March 2013, a German group posted full sequence data from a HeLa cell
line on two open-access databases (at the European Bioinformatics Insti-
tute and the NIH’s National Center for Biotechnology Information); se-
quence data from another HeLa cell line by an American group were
simultaneously in press. Such public sharing of scientific data is widely
viewed as a public good that advances science and is required by many
prominent funders and prestigious journals. Henrietta Lacks’s family ex-
pressed concern that sharing the full HeLa sequence also could reveal ge-
netic information about the family; some members of the public agreed
with their concerns. Both groups of investigators agreed to withholding of
the data from open access while the issue was discussed over a 4-month
period among scientists (led by NIH director Collins) and members of the
Lacks family. The matter was resolved by mutual agreement. DNA se-
quences derived from HeLa cells will be deposited into a controlled-access
(rather than open-access) NIH database. The HeLa Genome Data Access
Working Group, an advisory committee to the NIH director, was formed
to evaluate requests from researchers for access to the data. The working
group includes two members of the Lacks family. As part of the agreement,
researchers who use or derive genomic data from HeLa cells are asked to
acknowledge the contribution of Henrietta Lacks and her family in their
publications. However, in describing the agreement, NIH officials Kathy
Hudson and Francis Collins stated, “It is important to note, however, that
we are responding to an extraordinary situation here, not setting a prece-
dent for research with previously stored, de-identified specimens. The ap-
proach we have developed through working with the Lacks family is
unique because HeLa cells were taken and used without consent, and gave
rise to the most widely used human cell line in the world, and because the
family members are known by name to millions of people.”
Early on, it was believed that deidentification of specimens might obvi-
ate the need for robust consent for future use. However, a small number of
genetic variants can uniquely identify a single individual. Even in data
376 Chapter 11
DURC
certain details of the research on the mutations the H5N1 viruses acquired
that allowed their airborne transmission in animals. A few months later,
the NSABB reviewed revised manuscripts and reversed its decision, rec-
ommending full publication of both. The NSABB recommendations to
fully publish the work were announced in March 2012, a few weeks after
the World Health Organization recommendation to publish them without
redaction was announced. The papers appeared in print in May and June
of 2012.
The external review of the manuscripts and the broad discussion that
accompanied the biosecurity implications of the work prompted a group of
about 40 researchers to declare a voluntary moratorium on work aimed at
H5N1 transmissibility. The moratorium was implemented to create more
time for discussions about this research and measures to minimize its risk.
Further, the moratorium was expected to afford time for organizations and
governments around the world to develop “the best solutions for opportu-
nities and challenges that stem from the work.” A 60-day voluntary mora-
torium on such research was announced in a letter to the editor of Science
and was titled “Pause on Avian Flu Transmission Research.” In fact, the
moratorium lasted approximately 1 year instead of the planned 2 months.
In its statement on recommending the publication of the H5N1 manu-
scripts, the NSABB said:
As a general principle, the NSABB strongly supports the unrestricted com-
munication of research information unless that information could be directly
misused to pose a significant and immediate risk to public health and safety.
While the communication of the information in these revised manuscripts
still presents dual use concerns, the additional information changed the
Board’s risk/benefit calculation.
• The data described in the revised manuscripts do not appear to pro-
vide information that would immediately enable misuse of the re-
search in ways that would endanger public health or national
security.
• New evidence has emerged that underscores the fact that under-
standing specific mutations may improve international surveillance
and public health and safety. Global cooperation, critical for pan-
demic influenza preparedness efforts, is predicated upon the free
sharing of information and was a fundamental principle in evaluat-
ing these manuscripts.
In late March 2012, the U.S. federal government issued the United
States Government Policy for the Oversight of Life Sciences Dual Use
Research of Concern. The plan is available on the NSABB website, and its
central purpose is “to establish regular review of United States Govern-
ment funded or conducted research with certain high-consequence patho-
gens and toxins for its potential to be dual use research of concern” in
order to mitigate risks associated with such research. The policy’s
380 Chapter 11
rDNA technology and its use. Although the concept of dual use research
had been discussed for decades, the bioterrorism attacks of 2001 focused
attention on the need to address DURC especially as it applies to life sci-
ences research. Public events provided the stimulus for action, and the
U.S. National Academy of Sciences and the U.S. Center for Strategic In-
ternational Studies sponsored a meeting of scientists, editors, and other
stakeholders to discuss national security and scientific publication. The
discussions of the so-called Journal Editors and Authors Group were artic-
ulated in its 2003 published statement in Nature (“Statement on the Con-
sideration of Biodefence and Biosecurity”). This statement catalyzed more
proactivity, most notably the publication of the Fink Report and the im-
plementation of biosecurity review policies by some journals. Both rDNA
and DURC involved moratoriums that were self-imposed by the scientists
involved in the work. But the rDNA moratorium generally applied to the
experimental technology, while the moratorium that was imposed in the
case of DURC specifically involved research on the transmission of influ-
enza virus.
DURC process and policy development in the life sciences is still na-
scent, as reflected in the U.S. government’s policy that contemplates “up-
dating as needed, following domestic dialogue, engagement with our
international partners, and input from interested communities.” So a full
and rigorous comparison of the rDNA debate and DURC must await fur-
ther development and implementation of policies, guidelines, and codes
that take DURC into account. In the meantime, both the rDNA debate
and policy development and the ongoing discussions and policy develop-
ment related to DURC remain as worthy examples of the scientific enter-
prise engaging in dialogue and action in matters regarding the broad
impact of scientific research on society.
Conclusion
Discussion Questions
1. Should the genome sequence data of dangerous pathogenic agents
be restricted or placed in the public domain? Why?
2. The prospects of genetic screening raise interesting and sometimes
controversial issues when applied to the family setting. Disclosing
information may violate a sibling’s right to privacy, but withholding
it may cause harm, too. How should information discovered by ge-
netic technology in one family member be treated if it could affect
other family members?
3. What do you see as the issues surrounding the production and mar-
keting of genetically engineered foods? What roles can and should
scientists play in the discussion of genetically modified foods?
4. Frozen human embryos that have been stored for 7 years or longer
(and are not considered usable for in vitro fertilization) have been
suggested as sources to create human embryonic stem cell lines for
research. Do you favor this idea? Why or why not?
5. Should federal proposals that involve research on human genetic di-
agnostics and therapeutics be subjected to a review of their ethical
implications? Why? If you favor this, what weight should such a re-
view have relative to the review of scientific merit? Who should con-
duct the review?
6. Although safeguards may be in place, it is still possible that published
research findings or a new discovery may be used for evil purposes.
Does the scientist who created and published this new knowledge
bear any responsibility to help prevent inappropriate use of his or
her research findings? Is there any obligation for scientists to ensure
that new knowledge they create and publish is put only to good use?
Conversely, are there obligations for scientists to rectify wrongs or
harm done by inappropriate use of their research?
Science, Technology, and Society 383
Resources
Print
Atlas R, Campbell P, Cozzarelli NR, Curfman G, Enquist L, Fink G, Flanagin
A, Fletcher J, George E, Hammes G, Heyman D, Inglesby T, Kaplan S,
Kennedy D, Krug J, Levinson R, Marcus E, Metzger H, Morse SS, O’Brien
A, Onderdonk A, Poste G, Renault B, Rich R, Rosengard A, Salzberg S,
Scanlan M, Shenk T, Tabor H, Varmus H, Wimmer E, Yamamoto K; Jour-
nal Editors and Authors Group. 2003. Statement on the consideration of bio-
defence and biosecurity. Nature 421:771.
Beckwith J. 2002. Making Genes, Making Waves: A Social Activist in Science. Harvard
University Press, Cambridge, MA.
Beckwith J, Huang F. 2005. Should we make a fuss? A case for social responsibil-
ity in science. Nat Biotechnol 23:1479–1480.
Berg P, Baltimore D, Boyer HW, Cohen SN, Davis RW, Hogness DS, Na-
thans D, Roblin R, Watson JD, Weissman S, Zinder ND. 1974. Letter: Po-
tential biohazards of recombinant DNA molecules. Science 185:303. (Also pub-
lished in Proc Natl Acad Sci USA 71:2593–2594 [1974].)
Berg P, Baltimore D, Brenner S, Roblin RO III, Singer MF. 1975. Asilomar
conference on recombinant DNA molecules. Science 188:991–994. (Also pub-
lished in Proc Natl Acad Sci USA 72:1981–1984 [1975].)
Bulger RE, Heitman E, Reiser SJ. 2002. The Ethical Dimensions of the Biological
and Health Sciences, 2nd ed. Cambridge University Press. Cambridge, United
Kingdom.
Cohen SN, Chang AC, Boyer HW, Helling RB. 1973. Constructions of biologi-
cally functional bacterial plasmids in vitro. Proc Natl Acad Sci USA 70:3240–3244.
Elward C. 2013. Dual use research of concern: practical policy approaches to best
avoid misuse in the life sciences. The Spectra (the Virginia Engineering and Sci-
ence Research Journal) IV, Spring 2013, p 11–20. http://www.seas
.virginia.edu/pubs/spectra/pdfs/journal.pdf.
Fouchier RA, García-Sastre A, Kawaoka Y, Barclay WS, Bouvier NM, Brown
IH, Capua I, Chen H, Compans RW, Couch RB, Cox NJ, Doherty PC,
Donis RO, Feldmann H, Guan Y, Katz J, Klenk HD, Kobinger G, Liu J,
Liu X, Lowen A, Mettenleiter TC, Osterhaus AD, Palese P, Peiris JS, Perez
DR, Richt JA, Schultz- Cherry S, Steel J, Subbarao K, Swayne DE,
Takimoto T, Tashiro M, Taubenberger JK, Thomas PG, Tripp RA, Tumpey
TM, Webby RJ, Webster RG. 2012. Pause on avian flu transmission research.
Science 335:400–401.
Frederickson D. 2001. The Recombinant DNA Controversy—A Memoir. ASM Press,
Washington, DC.
384 Chapter 11
Holtzman NA, Watson MS. 1998. Promoting Safe and Effective Genetic Testing in
the United States: Final Report of the Task Force on Genetic Testing. Johns Hopkins
University Press, Baltimore, MD.
Hudson KL, Collins FS. 2013. Biospecimen policy: family matters. Nature
500:141–142.
Imai M, Watanabe T, Hatta M, Das SC, Ozawa M, Shinya K, Zhong G, Han-
son A, Katsura H, Watanabe S, Li C, Kawakami E, Yamada S, Kiso M, Su-
zuki Y, Maher EA, Neumann G, Kawaoka Y. 2012. Experimental adaptation
of an influenza H5 HA confers respiratory droplet transmission to a reassortant
H5 HA/H1N1 virus in ferrets. Nature 486:420–428.
Jackson DA, Symons RH, Berg P. 1972. Biochemical method for inserting new
genetic information into DNA of simian virus 40: circular SV40 DNA mole-
cules containing lambda phage genes and the galactose operon of Escherichia
coli. Proc Natl Acad Sci USA 69:2904–2909.
Lander ES. 2011. Initial impact of the sequencing of the human genome. Nature
470:187–197.
National Research Council. 2004. Biotechnology Research in an Age of Bioterrorism.
National Academies Press, Washington, DC. http://www.nap.edu/openbook
.php?isbn=0309089778.
Pigman W, Carmichael EB. 1950. An ethical code for scientists. Science 111:643–
647.
Reinhold R. 1969. Scientists isolate a gene; step in heredity control. The New York
Times, November 23, 1969, p 1, 72.
Reiser SJ, Bulger RE. 1997. The social responsibilities of biological scientists. Sci
Eng Ethics 3:137–143.
Rodriguez LL, Brooks LD, Greenberg JH, Green ED. 2013. Research ethics.
The complexities of genomic identifiability. Science 339:275–276.
Science. 2012. Special issue: H5N1. http://www.sciencemag.org/site/special/h5n1/.
Shapiro J, Machattie L, Eron L, Ihler G, Ippen K, Beckwith J. 1969. Isolation
of pure lac operon DNA. Nature 224:768–774.
Shuster E. 1997. Fifty years later: the significance of the Nuremberg Code. N Engl
J Med 337:1436–1440.
Online
Paul Berg’s 2004 article “Asilomar and Recombinant DNA” is available on
the Nobel Prize website:
http://www.nobelprize.org/nobel_prizes/chemistry/laureates/1980/berg-article
.html
The Ethical, Legal and Social Implications (ELSI) Research Program, Na-
tional Human Genome Research Institute (NHGRI)
http://www.genome.gov/elsi/
HeLa Genome Data Access Working Group (with link to HeLa data shar-
ing agreement):
http://acd.od.nih.gov/hlgda.htm
National Select Agent Registry (Centers for Disease Control and the Ani-
mal and Plant Health Inspection Services/Agricultural Select Agent
Program):
http://www.selectagents.gov/
United States Government Policy for the Oversight of Life Sciences Dual
Use Research of Concern (2012):
http://oba.od.nih.gov/oba/biosecurity/pdf/united_states_government_policy_for_
oversight_of_durc_final_version_032812.pdf
Scientific Integrity: Text and Cases in Responsible Conduct of Research, 4th ed.
by Francis L. Macrina
© 2014 ASM Press, Washington, DC
doi:10.1128/9781555818487.AppI
387
388 Appendix I
to elicit information about common trends and attitudes that would other-
wise be lost. The following includes both general observations about the
use of the sample surveys and some specific comments about the use of
each.
The surveys included below parallel the topic areas of this text. The
following points should be kept in mind when employing them as teaching
tools. First, because some surveys overlap, their selection is at the discre-
tion of the instructor. Further, not all surveys will be appropriate to meet
the needs of a specific course, instructor, or group of students. Second,
these surveys should not be viewed as definitive; instructors may want to
develop new surveys to meet specific instructional objectives. Third, nearly
all of these surveys are suitable for administration during class or a work-
shop, but some may be more appropriate as homework assignments. For
purposes of homework or distribution, these forms can be found as PDF
files at this book’s website, www.scientificintegrity.net, and printed for con-
venient use, or suitable response sheets may be prepared by the instructor.
Fourth, simply completing these surveys can have value in stimulating re-
flection on personal values and the normative conduct of science. How-
ever, analysis and discussion of survey results are a key part of this exercise.
The instructor could do the analyses, but it may be even more valuable to
have trainees summarize the data, select results of interest, present their
findings, and lead class discussion about interesting results. Usually, it is
not necessary for the survey discussants to focus on the responses to each
and every item in the survey. Instead, identifying questions that reveal dif-
fering attitudes and perceptions on the part of the respondents is desirable.
These should be used to stimulate class discussion, allowing the discus-
sants to state their positions and the rationales underlying their responses.
Such discussions allow students to invoke their critical thinking skills in
articulating their arguments. Equally important, these discussions fre-
quently uncover multiple points of view, many of which have merit and can
be appropriately defended.
Author’s note
Using surveys to collect information may fall into the category of human
subjects research. In such cases, institutional review board (IRB) approval
must be sought before any work is begun (see chapter 5). The definition of
human subjects research centers on the fulfillment of criteria related to the
subjects and to the investigational process and goals. Human subjects are
defined as living individuals about whom an investigator obtains (i) infor-
mation, specimens, or other data through intervention or interaction with
the individual or (ii) identifiable private information. The word “research”
is meant to encompass systematic investigation designed to develop or
contribute to generalizable knowledge. If you use the surveys in this
Surveys as a Tool for Training in Scientific Integrity 389
appendix as tools for stimulating class discussion, and nothing more, your
actions do not constitute contributing to generalizable knowledge. Under
these conditions, administering these surveys and presenting the resulting
data for purposes of discussion do not constitute research. However, the
authors of this appendix and this book encourage users to check with their
institutions’ review boards to verify whether such use is exempt, can be
expedited for review, or requires full IRB review. If your use of these sur-
veys extends beyond the immediate purpose of classroom instruction, it is
likely that IRB review and approval would be needed.
Survey Descriptions
References
Print
Online
Some organizations conduct public surveys on matters related to research.
These reports are generally available in the public domain. Typically, the
results are compiled in useful formats and can be presented to catalyze
discussion in a variety of relevant areas. For example, a survey done by the
Wellcome Trust Monitor reported survey data on such things as public
awareness and understanding of science, participation in medical research,
and attitudes toward genetics. The list of organizations that engage in such
survey activities is given below, along with their URLs. At these sites you
can search for survey results or reports that may be useful in generating
Surveys as a Tool for Training in Scientific Integrity 393
Research!America
http://www.researchamerica.org/
Wellcome Trust
http://www.wellcome.ac.uk
Survey 1: Overview
4. Has your name been omitted from a paper for which you made a sub-
stantial contribution?
Yes No
5. Have you been an author on a paper for which any of the authors had
not made a sufficient contribution to warrant credit for the work?
Yes No
11. Have you ever reported research or experimental results that you
knew to be untrue?
Yes No
12. Would you report a coworker who you believe had violated scientific
integrity standards?
Yes No
13. Would you report your supervisor/advisor who you believe had vio-
lated scientific integrity standards?
Yes No
Please use the scale below to rank the level of your agreement or disagree-
ment with each of the following statements.
1 Strongly disagree
2 Disagree
3 Neither agree nor disagree
4 Agree
5 Strongly agree
Survey 3: Mentoring
Please use the scale below to rank the level of your agreement or disagree-
ment with each of the following statements.
1 Strongly disagree
2 Disagree
3 Neither agree nor disagree
4 Agree
5 Strongly agree
1. A mentor is an advisor, not a supervisor.
Mentors should
12. be active in introducing their advisees to other scientists
(e.g., visiting seminar speakers, at scientific meetings).
Trainees should
15. invest time and effort to find an appropriate mentor.
Survey 4: Publication
You have just completed a small clinical study in which the drug appears to
have worked, but the result just misses statistical significance. It occurs to
you that by randomly selecting values from your previously published
study you could increase the size of your control group and thereby
demonstrate a significant effect.
1. Should you supplement your data with numbers from the previously
published experiment?
Yes No
Please use the scale below to rank the level of your agreement or disagree-
ment with each of the following statements.
1 Strongly disagree
2 Disagree
3 Neither agree nor disagree
4 Agree
5 Strongly agree
It is acceptable to
8. omit contradictory results from a paper.
Survey 5: Authorship
Two months after joining a new research group, you are preparing to sub-
mit a manuscript based on work you had completed while in your previous
position. Dr. Helix, one of your new colleagues, has just recommended
that you include Dr. Spiral, the head of the new research group, as an au-
thor on the paper. When you point out that Dr. Spiral had made no contri-
butions to the work, Dr. Helix observes that adding Dr. Spiral’s name
would improve the chances for publication and increase your prospects for
advancement within Dr. Spiral’s research group.
Please use the scale below to rank the level of your agreement or disagree-
ment with each of the following statements.
1 Strongly disagree
2 Disagree
3 Neither agree nor disagree
4 Agree
5 Strongly agree
9. organized the results and wrote the first draft of the paper.
15. for someone who has not read and approved the final
manuscript.
Surveys as a Tool for Training in Scientific Integrity 401
You are a postdoc in the laboratory of Dr. Strauss. Dr. Strauss has been asked
to review a manuscript, which she has now handed to you for your com-
ments. When you ask if she has notified the journal editor that you will be
reviewing the manuscript, she replies that there is no need to do so because
sharing the responsibility of manuscript review is common practice.
Find at least one investigator who is willing to give you a few minutes of
time to talk about the process of manuscript review. Please use the scale
below to ask the investigator about his or her own practice (“Investigator”)
as well as his or her impressions of what constitutes “common practice” for
each of the following (questions #3 to 6).
1 Never
2 Rarely
3 Occasionally
4 Often
5 Always
Please use the scale below to rank the level of your agreement or disagree-
ment with each of the following statements.
1 Strongly disagree
2 Disagree
3 Neither agree nor disagree
4 Agree
5 Strongly agree
13. should ask what role the reviewer assigned by the editor
will have in independently reviewing the manuscript or
editing the review the trainee writes.
Please use the scale below to rank the level of your agreement or disagree-
ment with each of the following statements.
1 Strongly disagree
2 Disagree
3 Neither agree nor disagree
4 Agree
5 Strongly agree
6. researchers.
7. the institution.
Please use the scale below to rank the level of your agreement or disagree-
ment with each of the following statements.
1 Strongly disagree
2 Disagree
3 Neither agree nor disagree
4 Agree
5 Strongly agree
3. frogs or fish.
4. leeches or snails.
6. nonhuman primates.
7. dogs.
8. pigs.
Surveys as a Tool for Training in Scientific Integrity 405
9. frogs.
10. cockroaches.
13. dogs.
14. pigs.
15. frogs.
16. cockroaches.
Please use the scale below to rank the level of your agreement or disagree-
ment with each of the following statements.
1 Strongly disagree
2 Disagree
3 Neither agree nor disagree
4 Agree
5 Strongly agree
Please use the scale below to rank the level of your agreement or disagree-
ment with each of the following statements.
1 Strongly disagree
2 Disagree
3 Neither agree nor disagree
4 Agree
5 Strongly agree
and a part-time student) and is struggling to win federal grant support and
tenure. Indicate on the following scale the degree to which each of the
following reasons justifies her not sharing data.
1 Not justifiable
2 Rarely justifiable
3 Sometimes justifiable
4 Generally justifiable
5 Always justifiable
Please use the scale below to rank the level of your agreement or disagree-
ment with each of the following statements.
1 Strongly disagree
2 Disagree
3 Neither agree nor disagree
4 Agree
5 Strongly agree
8. the institution.
15. science.
Consider your current primary research project. Using the scale below,
answer the following questions to indicate your willingness to share with
someone you do not know from another university.
1 Never
2 Only after the paper is accepted for publication
3 Only after the paper is submitted for publication
4 Only after it is possible to begin writing the paper
5 At any time
17. Methods
18. Reagents
Please use the scale below to rank the level of your agreement or disagree-
ment with each of the following statements.
1 Strongly disagree
2 Disagree
410 Appendix I
Please use the scale below to rank the level of your agreement or disagree-
ment with each of the following statements.
1 Strongly disagree
2 Disagree
3 Neither agree nor disagree
4 Agree
5 Strongly agree
Student Exercises
T his appendix contains six exercises that cover topics presented in the
chapter material. Exercises 1, 3, 4, 5, and 6 may be given as writing
assignments or used for in-class discussion. Exercise 2 is a dramatic script
that students (and instructors) may use to role-play a scenario. This exer-
cise provides the participants with scripted material regarding their contri-
bution to a research project. The actors must then add their own ad lib
commentary as to the rationale they will use to make a case for (or against)
authorship on a planned manuscript.
Student assignment
Write an e-mail of no more than 350 words to your postdoctoral mentor
in which you make a case for being the first author on the paper. Indicate
the journal to which you propose to submit the work. You can make any
assumptions about your work on and contributions to the project. Com-
pare your contributions to those of your collaborators in making your
Scientific Integrity: Text and Cases in Responsible Conduct of Research, 4th ed.
by Francis L. Macrina
© 2014 ASM Press, Washington, DC
doi:10.1128/9781555818487.AppII
413
414 Appendix II
The players
The players include members of the Lee laboratory and their collabora-
tors. There are parts for a total of 11 people in this script: 9 lab members
or collaborators and 2 “consultants.” By selecting just certain players in the
cast, the script can be performed with fewer participants.
Dr. Shin-Cho Lee: university professor of chemistry, principal investi-
gator (lab chief)
Student Exercises 415
Dr. Kim Ward: a research assistant professor working under Dr. Lee
Pat Langella: a fourth-year predoctoral trainee; Dr. Lee is Langella’s
Ph.D. supervisor
Dr. Fran McClure: an assistant professor in the department of chemis-
try whose area of research is enzymology
Phil Newton: a research associate in the department of genetics who
directs the university’s nucleic acid shared resource; this facility pro-
vides high-throughput DNA sequencing and synthesis on a fee-for-
service basis
Robin Willow: one of Dr. Lee’s technicians
Casey Tucker: a Ph.D. biochemist, presently enrolled in law school and
doing part-time postdoctoral research in Lee’s lab
Chris Evans: an undergraduate student who is doing a multiyear honors
project under Dr. Lee’s guidance
Dr. Sydney Chance: a postdoctoral fellow in Dr. Fran McClure’s lab
The following players have no scripted lines but are free to comment at
any point during the play. They were invited to the meeting as “consul-
tants” by Dr. Lee. Both are journal editorial board members whose publi-
cations have guidelines that may be found on the journals’ websites. (In
preparing for this exercise, all cast members will be aided by reviewing the
information found on these sites and by reading chapter 4.)
The play
Dr. Shin-Cho Lee: Good morning, everyone. As you may remember
when this project began, we had some casual conversations about who
would be authors on a paper, should the results be publishable. Well, we
now have exciting results and they certainly are publishable! So today, we
need to get serious about who goes in the author byline or in the acknowl-
edgments. I asked you each to prepare a concise statement about your part
in the work in order to get this ball rolling. Today, we’ll just arrive at who
will be authors. We’ll work out the order of the authors’ names in the by-
line at a later time. Let me begin with my comments.
I wrote the NIH grant proposal that provided funding for this work. It
paid for research materials and the salaries of Syd Chance and Kim Ward.
The idea to look for a heat-resistant DNA ligase was Fran McClure’s,
and the idea to commercially apply this discovery was mine. These
416 Appendix II
Cast: [Response from anyone in the group (don’t be shy; challenge Dr.
Lee if you believe authorship criteria are not met).]
***
Dr. Shin-Cho Lee: Okay, let’s move on. Kim, tell us about your
contribution.
Dr. Kim Ward: After a long struggle, I cloned the DNA ligase gene as a
“side project” during a break in my own research activities. I did a prelim-
inary characterization of the cloned gene and made milligram amounts of
the recombinant plasmid carrying the gene. I gave this plasmid material to
Pat Langella, who performed the nucleotide sequence analysis of the DNA
ligase gene. I did a small amount of the experimental work on the pro-
posed assay.
Regarding authorship, I believe I should . . . [State your argument for
being an author, being named in the acknowledgments, or neither.]
Cast: [Response from anyone in the group (challenge Dr. Ward if you be-
lieve authorship criteria are not being met).]
***
Cast: [Response from anyone in the group (challenge Pat if you believe
authorship criteria are not being met).]
***
Dr. Fran McClure: I had the original idea to look for a heat-resistant
DNA ligase. I suggested several sources for isolating enzymes from lower
plants living in extreme conditions. I designed the enzyme purification
scheme and supervised Pat Langella in this aspect of the work. I critiqued
all data involving the enzyme isolation and purification. On several occa-
sions, I suggested new experimental approaches to the enzyme purifica-
tion, all of which proved fruitful.
I believe I should . . . [State your argument for being an author, being
named in the acknowledgments, or neither.]
Cast: [Response from anyone in the group (challenge Dr. McClure if you
believe authorship criteria are not being met).]
***
418 Appendix II
Dr. Shin-Cho Lee: Phil, tell us about your participation in this project.
Cast: [Response from anyone in the group (challenge Phil if you believe
authorship criteria are not being met).]
***
Cast: [Response from anyone in the group (challenge Robin if you believe
authorship criteria are not being met).]
***
Casey Tucker: Well, I’ve been doing part-time postdoctoral work in Dr.
Lee’s lab while I complete my final year of law school. I have expertise in
intellectual property law. I provided advice and guidance in both the clon-
ing and sequencing of this gene. Also, I performed about 100 hours of
background research on the technology transfer implications of this dis-
covery. I am advising Dr. Lee on the preparation of this manuscript in
terms of intellectual property protection. I will edit the final manuscript
and I will write and submit a provisional patent application.
I believe I should . . . [State your argument for being an author, being
named in the acknowledgments, or neither.]
Dr. Shin-Cho Lee: Any questions or comments for our future attorney?
Cast: [Response from anyone in the group (challenge Casey if you believe
authorship criteria are not being met).]
***
Cast: [Response from anyone in the group (challenge Chris if you believe
authorship criteria are not being met).]
***
Dr. Sydney Chance: I was asked by Dr. Lee to help Pat with the protein
bioinformatics. I showed Pat how to do comparative studies with the
amino acid sequence of the DNA ligase protein. Pat had no training or
experience in this kind of computer analysis but was a quick study! The
amino acid sequence comparisons turned out to be very interesting. I did
some sophisticated phylogenetic tree analysis using a computer program I
wrote, and together Pat and I concluded that this DNA ligase is closely
related to similar enzymes from bacteria that live in the hot springs at
Yellowstone.
I believe I should . . . [State your argument for being an author, being
named in the acknowledgments, or neither.]
Dr. Shin-Cho Lee: We’re open for discussion about Dr. Chance’s
contributions.
Cast: [Response from anyone in the group (challenge Dr. Chance if you
believe authorship criteria are not being met).]
Student assignment
You have been asked to write an editorial that presents your position on
online postpublication peer review. The editorial should emphasize the role
of personal blogs and social media. Points that the editor would like you to
cover include (i) whether authors have an obligation to respond to blog-
gers’ comments, and if so, the forum for doing so; (ii) whether journals and
publishers should develop policies on handling bloggers’ comments and for
follow-up action with authors; and (iii) the merits of including any and all
online commentary about a published paper in measuring its impact on the
field. Your editorial must not exceed 750 words in length.
3. The material is being provided only for the stated use; permission
must be sought from the Cancer Research Institute if other uses of
the material are planned.
4. The material may not be released to any other investigators outside
of the faculty member’s lab.
5. The faculty member must provide the names of any and all lab staff
or trainees working with the material.
6. SRU must certify that it will not hold the Cancer Research Insti-
tute legally responsible for any harm or injury that may be caused
by the material or its use.
7. The faculty member or SRU cannot disclose, by any means, any of
the work done or results obtained with this material without first
seeking and obtaining the permission of the Cancer Research Insti-
tute.
8. Dr. Salazar reserves the right to be an author on any manuscripts
submitted for publication.
9. The faculty member or SRU cannot use the material for any com-
mercial or profit-making purposes.
10. Any patentable invention that relates to new uses of the material
that could not have been made but for the contribution of the ma-
terial will be jointly owned by SRU and the Cancer Research Insti-
tute. Any revenues arising for any use or implementation of such an
invention will be shared by SRU and the Cancer Research Insti-
tute. The sharing of such revenues will be negotiated in good faith
based on the relative contribution of the material to the invention.
11. At the conclusion of the work, the material will be returned to the
Cancer Research Institute or destroyed.
12. All lab members must be notified in writing of the terms of the re-
lease of the material and its use under those terms.
You are asked to countersign this letter and return it to the Cancer Re-
search Institute before the material can be released to you. This is your
first experience with such a letter, and it does raise some concerns and
questions in your mind.
You show the letter to a colleague, who comments that such agreements
aren’t worth the paper they’re printed on. She advises you to just sign it
and return it so you can get the compound and move ahead with your
work.
You show the letter to your departmental chair, who informs you that
the letter must be approved and countersigned by someone authorized to
sign on behalf of SRU, in this case the director of sponsored programs.
You show the letter to another faculty colleague, who confirms your
notions that some of the items are too restrictive and inappropriate
Student Exercises 423
Student assignment
Comment on the advice being given by each of these individuals. What, if
any, clauses are unacceptable to you? Why? Are all of these conditions con-
sistent with current standards of the transfer of biological materials for
research purposes? Finally, explain the course of action you would take in
this situation, specifically providing the edits you’d make to any of the
items and the rationale for making them.
Student assignment
You discuss this with the senior administrator for research who appoints
the membership of this committee. She asks you to make a decision based
on your best judgment and to
1. Write a letter to her, advising her of your recommendation, along
with reasons for your decision.
2. Write a letter to the professor who asked you to nominate him for
committee membership, giving your decision and reasons for your
decision.
3. Prepare a draft of your response should members of the institutional
advisory committee ask you about the matter.
4. Prepare a draft of your plan of action should a member of the press
or an animal rights organization ask you about the matter.
Background information
The following policy is in force at your institution, Research University.
RESEARCH UNIVERSITY
Policy on Industry Relationships
DEFINITIONS
“Industry” refers to any person or company seeking to do or doing business with
Research University, including any pharmaceutical, medical device, medical pub-
lishing, or medical equipment companies.
Student Exercises 425
“Gift” means any gratuity, favor, discount, entertainment, hospitality, loan, for-
bearance, or other item having monetary value. It includes services as well as gifts
of transportation, local travel, lodgings, and meals, whether provided in kind, by
purchase of a ticket, payment in advance, or reimbursement after the expense has
been incurred.
POLICY
1.0 Gifts
Gifts from industry and/or representatives are prohibited. This encompasses gifts
from equipment and service providers as well as pharmaceutical and device
manufacturers.
2.0 Pharmaceutical Samples
Samples must be deposited with the nurse manager or other appropriate profes-
sional in each clinic/unit. Each clinic/unit must implement a reconciliation process
and policy for handling pharmaceutical samples. The clinic administration and the
department in concert with Research University Compliance must develop this
process.
3.2 Involvement of students and trainees in such individual meetings should occur
only for educational purposes and only under the supervision of a faculty member.
3.3 Pharmaceutical representatives may be invited to a patient care area when the
faculty provider requests training or demonstration of a product.
4.2 Representatives should not be allowed to be present during any patient care in-
teraction unless there has been prior disclosure to and consent by the patient, and
then only to provide in-service training or assistance on devices and equipment.
4.3 Student interaction with representatives should occur only for educational
purposes under faculty supervision.
426 Appendix II
5.2 The CME Central Office will institute audit mechanisms to ensure compli-
ance with Accreditation Council for Continuing Medical Education (ACCME)
Standards for Commercial Support of CME. The CME Central Office requires
financial disclosure/COI management for those involved in planning and/or pre-
senting a CME activity.
5.3 Faculty must disclose personal and professional relationships with industry in
formal lectures to students, residents, and other health care professionals.
5.4 Faculty, residents, and students are strongly discouraged from attending
industry-supported medical education that is non-CME or that is not offered by
hospitals, health systems, specialty societies, and medical schools accredited
by ACCME. This does not apply to required training or instruction associated with
new devices or equipment.
6.3 Faculty and trainees are strongly discouraged from attending non-ACC-
ME-accredited industry events billed as CME.
6.4 Faculty and trainees are prohibited from engaging in the following
activities:
6.4.1 Accepting payment for attendance at industry-sponsored meetings; and
6.4.2 Accepting personal gifts from industry at such events.
7.3 The evaluation and selection of recipients of such funds must be the sole re-
sponsibility of the designated office/official based on institutional guidelines and
with no involvement by the donor industry.
Student Exercises 427
8.0 Food
8.1 Industry-supplied food and meals can be provided in connection with
ACCME-accredited programming and in compliance with ACCME guidelines.
There are no exceptions that permit industry-supplied food and meals within the
medical center.
9.0 Professional Travel
9.1 Faculty, trainees, and students are directly prohibited from accepting travel
funds from industry, other than for legitimate reimbursement or contractual
services.
9.2 The centrally designated administrative office must coordinate travel funds/
scholarships for faculty, trainees, and students.
10.0 Ghostwriting
Research University prohibits faculty, trainees, and students from allowing their
professional publications and presentations of any kind, oral or written, to be ghost-
written by any party, industry or otherwise. All listed authors should have made sub-
stantial contributions to the content of the paper and participated sufficiently in the
work to take public responsibility for the paper. In addition, the use of a slide presen-
tation developed and compiled by another party or individuals other than the pre-
senter is prohibited.
11.0 Purchasing
11.1 Faculty and personnel with any financial interest in any particular manufac-
turer of pharmaceuticals, devices, or equipment, or any provider of services, are
required to disclose such interests according to institutional policies and to recuse
themselves from involvement in purchasing decisions relevant to the conflicting
interests.
12.2 All credentialed providers must file a disclosure statement of personal inter-
est in a contract or transaction pursuant to engagement in such activities.
12.3 Relationships between all credentialed health care providers and industry
must be disclosed to patients at or before the establishment of the physician-patient
relationship and made available to the public.
428 Appendix II
13.2 Faculty members whose activity qualifies as consulting must comply with the
related policies governing fair market value compensation for services performed
and specified in advance, and with guidelines on potential COIs, publications, and
disclosure requirements.
13.3 Disclosure and approval of this relationship must occur through the outside
professional activity request process.
The dilemma
You are an assistant professor at Research University. You have received an
e-mail from a new assistant professor, Nora Okonjo, seeking your advice.
As part of her recruitment, Nora was provided with funds to purchase a
high-performance electron microscope (EM). She has done much research
on EMs that will fulfill her needs and has narrowed down her choice to
two manufacturers. One company is in Philadelphia and the other is in
Munich, Germany. She is striving to learn as much as possible about each
of these instruments in advance of Research University issuing a request
for bids that must be submitted by each company before a purchasing de-
cision can be made. The sales representative from the Munich company
has invited Nora to visit their facility with some of her samples and evalu-
ate the performance of the EM firsthand. He tells her this is a standard
company practice and that all of her travel expenses will be paid by the
company. Shortly after Nora agrees to the visit, she discovers that Research
University has a Policy on Industry Relationships (see above). Although it
appears to be aimed at industry relationships connected to health care
practice, research, and training, she wonders if the policy has implications
for her planned visit to Munich. She writes you stating that her visit’s pur-
pose is to perform the due diligence needed to make the best investment in
her research program. She asks you to look at the policy and comment on
whether it is relevant to her situation.
Student assignment
In an e-mail of no more than 350 words, write a response to Nora explain-
ing your interpretation of the policy in terms of how it may apply to her.
Your message should have enough detail to make your reasoning clear. If
you conclude that the situation presents a conflict of interest, can it be
managed? If so, describe the management plan you would propose. Finally,
taking the totality of your analysis and advice under consideration, give her
a definitive answer as to whether she should make the trip or cancel it, and
under what conditions.
appendix III
Standards of Conduct
Scientific Integrity: Text and Cases in Responsible Conduct of Research, 4th ed.
by Francis L. Macrina
© 2014 ASM Press, Washington, DC
doi:10.1128/9781555818487.AppIII
429
430 Appendix III
Federal Register
http://www.gpo.gov/fdsys/browse/collection.action?collectionCode=FR
The NIH (under the U.S. Department of Health and Human Services)
has a Web page in its Grants Policy document that is devoted to conflict of
interest, including a link to the most recently implemented Final Rule:
http://grants.nih.gov/grants/policy/coi/
Introduction
Scientists in the Intramural Research Programs at the National Institutes
of Health generally are responsible for conducting original research con-
sonant with the goals of their individual Institutes and Centers. These
Guidelines were developed to promote high ethical standards in the con-
duct of research by intramural scientists at the NIH. It is the responsibility
of each Principal Investigator who oversees a research group, and succes-
sive levels of supervisory individuals (especially Institute and Center Sci-
entific Directors), to ensure that every NIH scientist is cognizant of these
Guidelines and to resolve issues that may arise in their implementation.
Intramural scientists at NIH, as is true for all scientists, should be com-
mitted to the responsible use of scientific tools and methods to seek new
knowledge. While the general principles of scientific methodologies—
formulation and testing of hypotheses, controlled observations or experi-
ments, analysis and interpretation of data, and oral and written presentation
of all of these components to scientific colleagues for discussion and fur-
ther conclusions—are universal, their detailed application may differ in
different scientific disciplines and in varying circumstances. All research
staff in the Intramural Research Programs should maintain exemplary
standards of intellectual honesty in formulating, conducting, presenting,
and reviewing research, as befits the leadership role of the NIH.
These Guidelines complement existing NIH regulations for the con-
duct of research such as those governing human subjects research, animal
use, radiation, chemical and other safety issues, and the Standards of Con-
duct that apply to all federal employees.
The formulation of these Guidelines is not meant to codify a set of
rules, but rather to elucidate, increase awareness and stimulate discussion
of patterns of scientific practice that have developed over many years and
are followed by the vast majority of scientists, and to provide benchmarks
when problems arise. Although no set of guidelines, or even explicit rules,
Standards of Conduct 433
Publication
Publication of results is an integral and essential component of research.
Other than presentation at scientific meetings, publication in a scientific
journal should normally be the mechanism for the first public disclosure of
new findings. Exceptions may be appropriate when serious public health
or safety issues are involved. Although generally considered the end point
of a particular research project, publication is also the beginning of a pro-
cess in which the scientific community at large can assess, correct and fur-
ther develop any particular set of results.
Timely publication of new and significant results is important for the
progress of science. Fragmentary publication of the results of a scientific
investigation or multiple publications of the same or similar data are inap-
propriate. Each publication should make a distinct and substantial contri-
bution to its field. As a corollary to this principle, tenure appointments and
promotions should be based on the importance of the scientific accom-
plishments and not on the number of publications in which those accom-
plishments were reported.
Each paper should contain sufficient information for the informed
reader to assess its validity, including all the information that would be
necessary for scientific peers to repeat the experiments. Essential data
that are not included in the published paper due to space limitations (e.g.
nucleic acid and protein sequences, microarray data and crystallographic
information) should be deposited in the appropriate public databases or
made available online. It is not necessary to provide materials (such as
proteins) that others can prepare by published procedures, materials
(such as polyclonal antisera) that may be in limited supply, or clinical
specimens (whose distribution is controlled by human subjects protec-
tion requirements, as described in a later section). However, it is an obli-
gation of NIH intramural scientists to make reasonable amounts of
expandable materials (e.g. monoclonal antibodies, bacterial strains,
436 Appendix III
mutant cell lines) and analytical amounts of reagents (e.g. polyclonal an-
tibodies, purified proteins, uniquely-synthesized compounds) that are
essential for repetition of the published experiments available to quali-
fied scientists, using appropriate Material Transfer Agreements or collab-
orative agreements consistent with NIH policy. This can be achieved by
making arrangements to send such materials to a central repository.
Consult the PHS policy relating to the distribution of unique research
resources for further guidance (http://grants2.nih.gov/grants/guide
/notice-files/not96-184.html).
The current NIH Public Access Policy (http://publicaccess.nih.gov/
policy.htm) requests and strongly encourages all NIH-funded investiga-
tors to make their peer-reviewed final manuscripts available to other re-
searchers and the public at the NIH National Library of Medicine’s
(NLM) PubMed Central (PMC) (http://www.pubmedcentral.nih.gov) im-
mediately after publication of the final version. Authors are given the op-
tion to release their manuscripts at a later time, up to 12 months after the
official date of final publication. NIH expects that only in limited cases will
authors deem it necessary to select the longest delay period.
Authorship
Authorship refers to the listing of names of participants in all communica-
tions, both oral and written, of experimental results and their interpretation
to scientific colleagues. Authorship is the fulfillment of the responsibility to
communicate research results to the scientific community for external eval-
uation. Authorship is also the primary mechanism for determining the allo-
cation of credit for scientific advances and thus the primary basis for
assessing a scientist’s contributions to developing new knowledge. As such, it
potentially conveys great benefit, as well as responsibility.
For each individual the privilege of authorship should be based on a
significant contribution to the conceptualization, design, execution, and/or
interpretation of the research study, as well as on drafting or substantively
reviewing or revising the research article, and a willingness to assume re-
sponsibility for the study. Individuals who do not meet these criteria but
who have assisted the research by their encouragement and advice or by
providing space, financial support, reagents, occasional analyses or patient
material should be acknowledged in the text but not be authors. These
authorship guidelines are comparable to those now described in the Uni-
form Requirements for Manuscripts Submitted to Biomedical Journals,
which were developed by the International Committee of Medical Journal
Editors (http://www.icmje.org/).
Because of the variation in detailed practices among disciplines, no uni-
versal set of standards for authorship can easily be formulated. It is ex-
pected, however, that each research group and Laboratory or Branch will
Standards of Conduct 437
Collaborations
Collaborative research brings together investigators with distinct strengths
to work together on a defined problem or address a specific research goal.
Research collaborations, within NIH as well as with extramural institu-
tions, are strongly encouraged and supported; the complex scientific ques-
tions that face us today often require interdisciplinary or multidisciplinary
approaches.
Successful collaborations are characterized by a strong sense of direc-
tion, a willingness to commit time and effort, an efficient communication
strategy for discussion among the group members, a system in place for
reevaluation as the project progresses, and a clear definition of roles and
responsibilities. It is advisable that the ground rules for collaborations, in-
cluding eventual authorship issues, be discussed openly among all partici-
pants from the beginning. The NIH Ombudsman Office has developed a
useful set of criteria to consider in establishing collaborations (http://
ombudsman.nih.gov/resourcesScientist.html).
Whenever collaborations involve the exchange of biological materials
they are routinely formalized by written agreements. Material Transfer
Agreements (MTAs) are used for the simple transfer of proprietary re-
search material without collaboration, for example if you request a reagent
from, or give one to, a colleague outside the NIH. Cooperative Research
and Development Agreements (CRADAs) are agreements between one or
more NIH laboratories and at least one non-federal group (private sector,
university, not-for-profit, non-federal government).
CRADAs provide a protected environment for long-term collabora-
tions; they confer intellectual property rights to NIH inventions. CRADAs
are handled by the Technology Transfer Office of your Institute (http://
ott.od.nih.gov/).
Consulting can be viewed as a one-way collaboration, in which an NIH
scientist is asked to contribute to an outside project by providing expert
advice. Information about the NIH guidelines governing consulting activ-
ities and forms for obtaining permission can be found at http://ethics
.od.nih.gov/.
Standards of Conduct 439
1
Guidelines for Good Clinical Practice, developed by the International Confer-
ence on Harmonization of Technical Requirements for Registration of Pharma-
ceuticals for Human Use (ICH) can be accessed at www.ICH.org.
Standards of Conduct 441
Research misconduct
The scientific community and general public rightly expect adherence to
exemplary standards of intellectual honesty in the formulation, conduct,
reporting and reviewing of scientific research. Investigators must act with
honesty and integrity when editing, analyzing, and presenting data. De-
ceptive manipulation of data, be it misrecording of data, inappropriate ex-
clusion of outlying data points, or enhancement of images is research
misconduct.
Allegations of scientific misconduct are taken seriously by the National
Institutes of Health. The process of investigating allegations must be bal-
anced by equal concern for protecting the integrity of research as well as the
careers and reputations of researchers. The procedures followed at the NIH
are intended to permit allegations of scientific misconduct to be processed
promptly, confidentially, and fairly. Prompt action on an allegation helps
minimize any harm to the public that could result if misconduct is found
that has potential impact on health, and allows those who are incorrectly
implicated to have their names cleared without going through a lengthy
Standards of Conduct 443
Concluding statement
These Guidelines are not intended to establish rules or regulations. Rather,
their purpose is to provide a framework for the fair, open, and responsible
conduct of research without inhibiting scientific freedom or creativity.
Advice on any of the topics can be obtained from the offices cited in the
previous sections. You can consult with members of the NIH Committee
on Scientific Conduct and Ethics (http://www1.od.nih.gov/oir/source
book/comm-adv/sci-conduct.htm), with your Scientific Director or with
your IC Training Director. Advice is also available from the NIH Office of
the Ombudsman (http://www4.od.nih.gov/ccr/).
This page intentionally left blank
appendix IV
Scientific Integrity: Text and Cases in Responsible Conduct of Research, 4th ed.
by Francis L. Macrina
© 2014 ASM Press, Washington, DC
doi:10.1128/9781555818487.AppIV
445
446 Appendix IV
2.
Informed consent document. The full text of the informed consent doc-
ument for the above human subjects protocol is included, providing an
example of the required scope and level of presentation.
4.
Resources. This appendix material will help you appreciate the con-
text and content of illustrative subjects protection protocols. To write a
protocol that will serve you and your research subjects well will take addi-
tional study, mentoring, and practice. The “Resources” section below of-
fers some advice, additional protocol content requirements, and an
electronic portal to resources.
Staffing
Note: This section of the protocol contains a table listing the principal investigator (PI) and all coinvestigators involved in
the study, their qualifications, and their responsibilities. This information has been omitted to preserve anonymity, but the
following narrative from the protocol describes investigator participation and training.
A Project Director and the Graduate Research Assistants (GRAs) will be hired when funding is obtained. All personnel will
complete required institutional Human Subjects training. A comprehensive study training manual will be developed and
distributed to all study personnel. The training manual will include a study overview and all data collection procedures
and will be updated as needed. Prior to data collection, all study personnel will be trained to perform tasks appropriate to
their role in the project. The Project Director will be trained by the PI and co-investigators in all study procedures includ-
ing subject recruitment, obtaining consent consistent with applicable state and federal statutes, all interventions and
data collection procedures. Role specific training will include intervention procedures, blood and endotracheal secretion
sample collection, and use of PDAs for data collection for all personnel.The GRA who will provide pre-intubation interven-
tions will be trained in the procedure by the Project Director. After training is complete, each GRA will perform a return
demonstration on a dental mannequin model satisfactorily completing all critical elements identified (100% accuracy)
before interventions will begin. Each GRA will also be tested every 3 months throughout the study period to ensure that all
critical elements of each procedure are included. Monthly study meetings will be used to review study procedures and
communicate essential information; time sensitive information regarding study operations will be communicated by
called study team meetings and by e-mail.
Conflict of Interest
None of the investigators will benefit from subjects’ participation in this project or completion of the project in general.
Resources
A research proposal has been submitted to the National Institutes of Health to support the conduct of this project. Budget
items include personnel costs for investigators and support staff (including support of release time for investigators),
supplies, laboratory equipment, and chlorhexidine (CHX) mouthwash (dispensed for a fee from the Investigational Phar-
macy) for all subjects. Subjects will be recruited at University Medical Center. Medical Center Clinical Laboratories will
be used for processing of clinical microbiological specimens. The institutional Clinical Research Core will be used for
analysis of biomarkers and for data management.
448 Appendix IV
Hypothesis
Pneumonia is the second most common nosocomial infection in the US,1 and the leading cause of death from all nosoco-
mial infections, with mortality rates of 20-75%.1;2 Nosocomial pneumonia adds billions of dollars to health care costs,
prolongs mechanical ventilation time, increases ICU length of stay, and adds significantly to the hospital stay of surviving
patients.2-5 Ventilator-associated pneumonia (VAP) occurs in 25-30% of mechanically ventilated patients and is respon-
sible for 90% of nosocomial infections in this patient population.6;7 The risk is greatest in the first week of mechanical
ventilation, and this risk increases by as much as 3% per ventilator day in the first five days.8
Growth of potentially pathogenic bacteria in the oral cavity provides a nidus of infection for microorganisms that have
been shown to be responsible for VAP.9;10 The endotracheal tube provides a pathway for direct entry of bacteria from the
oropharynx through an open glottis to the lower respiratory tract. Once in place, the endotracheal tube promotes micro-
bial colonization by interfering with the cough reflex and the function of the mucociliary escalator and by stimulating ex-
cessive mucus secretion.5
We showed that VAP was reduced by topical application of CHX in our previous NIH-funded study. This randomized
clinical trial tested application of CHX initiated after intubation (within 24 to 48 hours) in critically ill adults. CHX is a broad
spectrum antibacterial agent that is FDA approved for control of dental plaque. Although recent research11-12 achieved a
reduction in VAP by topical oral CHX after intubation, these post-intubation interventions did not completely eliminate risk
of VAP.
Other procedures in which a tube is passed through a contaminated area into a sterile area (for example, insertion of
vascular lines, urinary tract catheters, and chest tubes) include cleaning the area prior to tube insertion to reduce
procedure-associated contamination. During the intubation procedure, organisms may be dragged by the tube from the
contaminated oropharynx to the sterile lung. Organisms introduced into the lung at the time of intubation would not be
suppressed by CHX applied after intubation, and may contribute to cases of VAP found in patients who receive therapies
only after intubation. Therefore, reducing the number of microorganisms in the mouth pre-intubation by application of
CHX, added to continual microbial suppression by CHX applied after intubation, is a theoretically attractive method to re-
duce the risk of VAP and is a logical extension of the previous study.
Little is known about the effects of pre-intubation CHX in mechanically ventilated critically ill patients. Definitive scien-
tific studies evaluating the addition of pre-intubation CHX in the general ICU population have not been conducted. Thus,
this proposal focuses on evaluating the benefit of adding a pre-intubation CHX dose to the known benefit of post-
intubation CHX to reduce the risk of VAP.
Specific Aims
This project is a continuation of our previously funded study, conducted under IRB #6789. The primary aim of this study is
to test the effect of a pre-intubation oral application of CHX on the development of VAP in a variety of mechanically venti-
lated, critically ill adults. We hypothesize that the intervention group (who receive a pre-intubation oral application of
CHX) will have lower scores on the Clinical Pulmonary Infection Score (CPIS) than the control group (who do not receive
pre-intubation intervention). Secondary aims are 1) to test the effect of a pre-intubation oral application of CHX on early
endotracheal tube colonization in mechanically ventilated adults, and 2) to explore potential biomarkers, including pro-
calcitonin and a panel of cytokines, of VAP development and resolution. We hypothesize that, for subjects extubated
within 24 hours of intubation, the intervention group will have fewer bacteria present on cultures of endotracheal tubes
removed at 24 hours. We further hypothesize that patterns of procalcitonin and serum cytokines will be associated with
the development and resolution of VAP.
intervention which is more feasible for most ICU patients than the self-administration of CHX shown to be effective in
elective cardiac surgery.
Microorganisms in the mouth are available for translocation to and colonization of the lung, which can result in
VAP.9;13-17 Oral organisms are concentrated in dental plaque, which is a complex environmental niche of interdependent
microorganisms embedded in bacterial and salivary products. Dental plaque may serve as a reservoir for pathogens in
patients with poor oral hygiene,14;18 and dental plaque of persons in the ICU has been shown to be colonized by potential
respiratory pathogens such as methicillin-resistant S. aureus and P. aeruginosa.10 Fourrier et al.9 found a high bacterial
concordance between dental plaque cultures and tracheal aspirate cultures in 57 ICU adult subjects. In 4 cases of VAP,
the causative organism of the pneumonia was isolated from the subject’s dental plaque prior to the diagnosis of pneumo-
nia. The dorsal tongue may also be a reservoir for potential VAP pathogens. Bahrani-Mougeot et al. compared bacteria
from the dorsal tongue and BAL in 16 trauma ICU subjects who had VAP.17 Using bacterial DNA sequencing, they found
that 14 subjects had potential pathogens colonizing the lung which were identical to those found in the subject’s oral
cavity.
Previous work demonstrated the relationship of oral health to VAP. In a descriptive study,16 it was demonstrated that
higher dental plaque scores conferred greater risk for ventilator-associated pneumonia, particularly for patients with
greater severity of illness. Oral health and CPIS were followed in 66 critically ill mechanically ventilated subjects for up to
7 days; a regression model was used to predict risk of pneumonia at day 4. Correlations were significant with day 4 CPIS
for score on the Acute Physiology and Chronic Health Evaluation (APACHE) II (P=.007), day 4 salivary volume (P=.02), in-
teraction of APACHE II score and day 1 CPIS (P<.001), and the interaction of day 1 CPIS and plaque (P=.01). Dental plaque
and oral organisms increased over time, and potential pathogens were identified in oral cultures for 6 patients before or
at the same time as the appearance of the organisms in tracheal aspirates.
The studies discussed above support the hypothesis that oropharyngeal organisms can serve as a reservoir for poten-
tial VAP pathogens.15;16 Because the endotracheal tube must pass through the microbially rich oral cavity and intubation
is usually performed without prior cleansing of the mouth, there is great opportunity for organisms to be introduced onto
the endotracheal tube and/or into the lung at the time of intubation. Thus, reducing the number of microorganisms in the
mouth pre-intubation by application of CHX, added to continual microbial suppression by CHX applied after intubation, is
a theoretically attractive method to reduce the risk of VAP, and underpins the primary aim of this study, which is to test the
effect of a pre-intubation oral application of CHX on the development of VAP in a variety of mechanically ventilated, criti-
cally ill adults.
Colonization of the endotracheal tube in mechanically ventilated adults is common and although it generally precedes
VAP, not all patients with colonization of the endotracheal tube develop VAP. However, the endotracheal tube can serve
as a reservoir for potential VAP pathogens. Cardenosa-Cendrero et al.19 found that 80 of 110 patients had tracheal coloni-
zation during the first day of mechanical ventilation. A pre-intubation application of CHX will likely have its greatest effect
on the incidence of early colonization and early VAP.
Adair et al. conducted microbiological examination of endotracheal tube aspirates in 40 mechanically ventilated sub-
jects (20 with VAP) and endotracheal tubes following extubation in the same subjects.20 Seventy per cent of patients with
VAP had identical pathogens (by genotyping) isolated from both ET tubes and endotracheal secretions. In adults under-
going elective intubation, Ogata et al.21 studied the effect of pre-intubation gargling with povidone-iodine on early coloni-
zation (during anesthesia) of the endotracheal tube. In the control group who gargled with water pre-intubation (n=19),
every subject’s endotracheal tube had organisms that matched pre-intubation oropharyngeal organisms. No organisms
were recovered from endotracheal tubes of subjects who gargled with povidone-iodine pre-intubation, although oropha-
ryngeal cultures were positive. These studies provide theoretical support for the proposed pre-intubation CHX interven-
tion, and our microbiological examination of endotracheal tubes removed in the first 24 hours (Secondary aim 2) will
provide an indication of the effectiveness of pre-intubation CHX in reducing early contamination of the endotracheal tube
in critically ill adults.
Interventions to reduce VAP through reducing the number of oral organisms have been reported recently. Several
studies have demonstrated that application of antimicrobials to the oral cavity following intubation reduces development
of VAP.22-26 The association between oral microbial flora and VAP is well documented, but no studies have compared pre-
intubation methods to reduce oral colonization in mechanically ventilated patients to treatment beginning after intubation
for removal of microorganisms or reduction of VAP.
The most recent (2004) Centers for Disease Control and Prevention (CDC) recommendations for prevention of nosoco-
mial bacterial pneumonia in patients receiving mechanically-assisted ventilation specifically address the importance of
oral microbial flora in the development of VAP.1 Recommendations for elective cardiac surgery patients direct the use of
CHX during the peri-operative period, based upon studies in which subjects began using CHX prior to hospital admission
450 Appendix IV
for elective cardiac surgery and CHX use was continued throughout the hospital stay.27-29 However, for other critically ill
patients the recommendations are much more general, and evidence available when the guidelines were updated was
insufficient to recommend CHX in the general ICU population. Since publication of the guidelines, we and others have
demonstrated reduction in VAP from post-intubation CHX, but the benefit of beginning CHX prior to intubation has not
been tested outside of elective cardiac surgery and the differential benefit of addition of pre-intubation CHX to post-
intervention application has not been tested in any population.
CHX is a broad spectrum antibacterial agent that has been used extensively in healthy populations as an oral rinse to
control plaque and to prevent and treat gingivitis.30;31 Microbial resistance to CHX has never been demonstrated, and it
has minimal side effects, making it an attractive alternative to the oral topical antibiotics used in the studies discussed
above.
Three investigative teams27-29 have examined the effectiveness of oral CHX in reducing nosocomial respiratory tract in-
fections in elective cardiac surgery patients. Importantly, in each of these studies the intervention was begun preopera-
tively (before intubation) and continued throughout the ICU stay. DeRiso et al.27 conducted a double- blinded,
placebo-controlled study of CHX in elective cardiac surgery subjects. In this study, subjects were randomly assigned to
receive CHX or placebo by oral rinse. Results demonstrated reductions in respiratory tract infection rates in cardiac sur-
gery subjects who received CHX pre-intubation as well as postoperatively (17/180 vs 5/173; p < 0.05). However, cardiac
surgery patients who present for elective surgery are likely to present with different comorbidities and better physiologic
status at the time of intubation than emergently intubated patients. This is reflected in the relatively low incidence of respi-
ratory tract infections (9%) noted in DeRiso et al.’s placebo group. The DeRiso study did not focus exclusively on VAP, but
used a broad definition of respiratory tract infection which included both tracheobronchitis and pneumonia. Houston and
coworkers28 conducted a randomized controlled trial examining the effect of CHX, begun before hospital admission and
continued throughout the hospital stay, on the incidence of postoperative infection (including surgical and respiratory tract
infections) in elective cardiac surgery patients. Recently, Segers et al.29 investigated the effect of 0.12% CHX on nosoco-
mial infections (including surgical and respiratory tract infections) in a randomized controlled trial of 954 elective cardiac
surgery patients. They also found a lower rate of postoperative infection in the CHX group than in the placebo group (9.3 vs.
15.8%; p = 0.002). The three studies discussed above focused broadly on nosocomial infection rather than on VAP. Although
all three studies demonstrated reductions in nosocomial infection rates in cardiac surgery subjects who received CHX pre-
intubation as well as postoperatively, no study has examined the effects of pre-intubation CHX in reducing VAP in other
critically ill populations, and none have examined whether pre-intubation intervention provides added benefit compared to
initiation of CHX after intubation. However, many patients undergoing intubation are not able to anticipate the event as
elective cardiac surgery patients do, and thus cannot self-administer multiple doses of CHX prior to intubation. It is feasible
to deliver a single pre-intervention dose prior to intubation, and if effective, the pre-intubation CHX could be broadly appli-
cable to a variety of ICU patients.
Recently, CHX has been investigated in other ICU populations as well. Koeman, et al.12 randomized subjects to control
or to oral topical application of either 2% CHX or 2% CHX with colistin. Both CHX groups had reduced daily risk of VAP
compared to control subjects (CHX vs control, p = 0.012; CHX + colistin, p=0.03).12 It should be noted that the concentration
of CHX used by Koeman et al. is higher than the FDA approved dental solution of 0.12% used in other reported studies. A
randomized controlled trial of 0.2% CHX versus placebo in 228 ICU patients by Fourrier, et al.32 failed to show an effect of
CHX on VAP rate, with reported VAP rates of 11% in each group. Our previous study demonstrated that CHX 0.12% solu-
tion applied topically to the oral cavity significantly reduced the incidence of pneumonia (defined by CPIS ≥ 6) among
subjects who were without pneumonia at baseline (p=0.0243). Reported studies conducted outside of the elective cardiac
surgery setting have not examined the effect of applying CHX prior to intubation, as we propose to do in this renewal
application.
Studies of VAP are complicated by the absence of a “gold standard” for diagnosis which can be scored prospec-
tively and at repeated intervals. Determination of VAP has been conducted using 2 broad categories of methods: micro-
biologic analysis of samples from the lung to demonstrate an etiologic agent, and clinical scoring tools to evaluate
clinical features indicating VAP. The optimal method for identification of VAP remains controversial, and is complicated
by the different needs of researchers (for robust research variables) and clinicians (for prompt patient treatment). There
has been considerable interest in identifying reliable and valid biomarkers that might precede clinical signs of VAP.33
Recent interest has centered on procalcitonin (PCT) and proinflammatory cytokines. Changes in PCT and cytokines are
early markers of immune activation, and activation of the immune system characterizes infections including VAP. The
performance of individual cytokines as indicators of VAP has been disappointing thus far, and PCT has been examined
in the context of VAP primarily as a prognostic indicator. However, no published studies have evaluated multiple cyto-
kines simultaneously with PCT at frequent intervals (i.e., daily) in an effort to understand immune system interactions in
the development of VAP. Thus, in this project, we will evaluate the usefulness for future research of PCT and a panel of
Sample Protocols for Human and Animal Experimentation 451
cytokines daily in a subset of subjects (the first 100 subjects enrolled who remain intubated beyond 24 hours) as bio-
markers of the development of VAP. The proposed work will add to the body of knowledge regarding immune response
in VAP, and holds promise for improving accuracy of VAP outcome definitions for future research.
1) Intervention: Oral application of 5 ml CHX gluconate 0.12% solution pre-intubation, and 5 ml CHX gluconate 0.12%
solution twice a day following intubation.
2) Control: No pre-intubation intervention, 5 ml CHX gluconate 0.12% solution twice a day following intubation.
452 Appendix IV
Subjects will be enrolled in the study prior to intubation. Subjects will remain in the study for five days or until extuba-
tion if extubated before five days. The length of participation for subjects was chosen based on increased risk of develop-
ment of VAP in the early part of ICU hospitalizations, and the theoretical consideration that the intervention is most likely
to reduce initial risk of early VAP.
Setting
The study will be conducted in four adult critical care units at the University Medical Center: the Medical Respiratory In-
tensive Care Unit (MRICU), the Surgical/Trauma Intensive Care Unit (STICU), Cardiac Surgery Intensive Care Unit (CSICU)
and the Neuroscience Intensive Care Unit (NSICU).
Sample
The sample of 200 subjects will be drawn from all patients over the age of 18 years admitted to the MRICU, STICU, CSICU
and NSICU at the University Medical Center who are being intubated and mechanically ventilated. Both male and female
subjects from all ethnic and racial backgrounds will be recruited. Subjects will be randomized to treatment according to
a permuted block design developed by the biostatistician such that after every k subjects balance will be maintained be-
tween the groups. To preserve the benefits of randomization, the value of k was determined by the study biostatistician
when the randomization tables were prepared.
Exclusion Criteria. The exclusion criteria will be clinical diagnosis of pneumonia at the time of intubation. Those who
have a diagnosis of pneumonia at the time of intubation will be excluded because a new episode of superimposed VAP
cannot be distinguished with certainty from worsening of the patient’s initial community acquired or nosocomial
pneumonia.
Power Analysis. Sample size required for statistical power was calculated based on detecting a difference in CPIS
scores of 1 between the two groups (Intervention and Control) using the data from the study described in the background
section . The common standard deviation from a two group ANCOVA model of the CPIS was estimated to be 2.2. Thus, for
a significance level of 5%, a sample size of 77 in each group (154 total) will have an 80% power and a sample size of 103 in
each group (206 total) will have a 90% power. Clearly, the planned sample of 100 for each group (200 total) will be suffi-
cient. Based upon attrition (primarily due to extubation) data in the previous study, we will plan to enroll 325 subjects in
order to assure a final analysis sample of 200 subjects who remain in the study for at least 48 hours and have outcome
data for analysis of the primary aim. Data from subjects who are enrolled but do not remain intubated until day 2 will be
used for analysis of secondary aim 1.
Pre-Intubation Intervention. The pre-intubation intervention involves administration of 5 ml CHX gluconate 0.12% solu-
tion. CHX has bacteriocidal properties against both gram positive and gram negative species.34 It is not absorbed through
skin or mucous membranes, so dosage adjustments are not necessary for renal or hepatic insufficiency. CHX adminis-
tered by oral swab or rinse has not been associated with serious side effects.35-37 Reported side effects include discolor-
ation of the teeth and tongue, and transient alterations in taste (dulling of taste sensation for several hours). Discoloration
of the teeth occurs in about 50% of patients with long term administration and is similar to tooth staining seen after
smoking and consumption of tannic acids such as tea, coffee, and wine. CHX discoloration is easily removed by profes-
sional dental hygiene.
In healthy populations, CHX is self-administered as a 0.12% solution oral rinse. The dosage is 15 ml administered twice
daily as a gargle. Although CHX is used primarily as a mouthwash or rinse, it has also been used by swab and found to be
equally effective.35;38 In this study, it is not possible to have subjects rinse with the solution; instead, a 5 ml volume will be
swabbed over the entire oropharynx. The optimal amount of CHX 0.12% required to cover all tooth surfaces was determined
using a full mouth model in a laboratory setting and in human volunteers. This swabbing procedure was effectively used in
the previous study, and was optimized in our pilot studies of a single peri-intubation intervention.39 The 0.12% strength solu-
tion is FDA approved for use as an oral rinse in the United States. Dr. Bond will serve as the medical monitor for the study.
Sample Protocols for Human and Animal Experimentation 453
Development of VAP. A graded clinical tool will be used in this proposed renewal to measure the development of VAP.
The Clinical Pulmonary Infection Score (CPIS) developed by Pugin et al.40 and used in our previous study is based on six
easily obtained variables: temperature, WBC count, tracheal secretions, oxygenation (calculated by PaO2 /FiO2), chest
radiograph (interpreted by Dr. Bond, co-investigator), and tracheal aspirate culture. The CPIS will be scored based on the
developers’ procedure.
Endotracheal Tube Microbial Flora. Endotracheal tubes removed from study subjects in the first 24 hours of the study
will be placed in broth culture and microbial species and a quantitative count of colony forming units for each species will
be determined. Because in the previous study, 24% of subjects were extubated within 24 hours of study enrollment, we
anticipate that 78 tubes will be obtained for examination. Examination of tubes removed in the first 24 hours of intubation
will illuminate the relationship between CHX administered prior to intubation and colonization of the endotracheal tube
(as reflected by microbial growth in the first 24 hours of intubation). Microbiological examination of endotracheal tubes
from subjects intubated for longer than 24 hours is more likely to be confounded by the ongoing administration of CHX in
all subjects, and would reduce the likelihood that we will be able to see a difference in early colonization due to the pre-
intubation portion of the intervention. Standard protocols were developed for the previous study by the Clinical Research
Core for specimen acceptance, handling, and processing to ensure accuracy and reproducibility of results.
Biomarkers. Serum will be collected daily from every subject, and stored at –70C in the Clinical Research Core until
samples have been collected from the first 100 subjects who have remained intubated beyond 24 hours. Biomarkers will
be assessed in thawed daily samples from the first 100 subjects enrolled who remain intubated beyond 24 hours. PCT will
be assayed from serum using a Lumat LB 9507 tube luminometer assay (Brahms AG, Hennigsdorf, Germany), according to
the assay manufacturer’s protocol. This commercially available assay has been used successfully in research involving
critically ill subjects. Levels of cytokines in serum will be determined using a Bio-Plex Suspension Array System (Bio-Rad)
with a commercial 17-plex cytokine detection kit according to the kit manufacturer’s protocol. Assays will be performed
in the Clinical Research Core.
Additional Data Collection. Data will be collected on additional factors in order to provide a comprehensive description
of the study sample and to assess equivalence of groups and will include the patient’s gender, ethnic background, and
reason for admission to the unit; severity of illness score (Acute Physiology, Age, and Chronic Health Evaluation-APACHE
III)41; global oral health (Decayed, Missing, and Filled Tooth Index at study admission42); administration of antibiotics prior
to entry into the study; type of intubation (emergent, oral vs nasal); daily ventilatory support data (ventilator mode, rate,
type of support, positive end-expiratory pressure, pressure support ventilation, FiO2, PaO2, and SaO2); daily enteral nutri-
tion data (presence, route, rate, type of enteral nutrition, and highest daily gastric pH); presence of antibiotic, histamine
blocker, proton pump inhibitors, and antacid therapy during the study period; backrest elevation; and time, type and
454 Appendix IV
number of mouth care interventions provided by caregivers. All data collected daily, will be collected in the morning and
will be documented from information in the patient’s medical record.
Procedures
Prestudy Training. A comprehensive study training manual will be developed and distributed to all study personnel. The
training manual will include a study overview and all data collection procedures and will be updated as needed. Prior to
data collection, all study personnel will be trained to perform tasks appropriate to their role in the project. The Project
Director will be trained by the PI and co-investigators in all study procedures including subject recruitment, obtaining
consent consistent with applicable state and federal statutes, all interventions and data collection procedures. Role
specific training will include intervention procedures, blood and endotracheal secretion sample collection, and use of
PDAs for data collection for all personnel. The graduate research assistants (GRAs) who will provide pre-intubation inter-
ventions will be trained in the procedure by the Project Director. After training is complete, each GRA will perform a re-
turn demonstration on a dental mannequin model satisfactorily completing all critical elements identified (100% accuracy)
before interventions will begin. Each GRA will also be tested every 3 months throughout the study period to ensure that all
critical elements of each procedure are included. This testing will be done both using a dental mannequin and by direct
observation of study personnel providing interventions to subjects. If any critical element is found to be omitted, retrain-
ing and return demonstrations will occur immediately until the omissions are corrected. If interventions are scheduled
before retraining can occur, the Project Director, PI, or Co-investigator will supervise the intervention to ensure that all
critical elements are present until retraining and revalidation can occur.
In addition, all study personnel involved in medical record data collection will achieve inter-rater reliability with the in-
vestigators and Project Director of 90% or greater before they can participate in data collection. This training will occur
prior to the start of the study using medical records similar to subjects who would be enrolled in the study. Once data col-
lection begins, the Project Director will review every data for completeness and appropriate entries before the data are
entered into the study database. At the beginning of the data entry process a minimum of 1 in every 10 participants entered
will be checked for entry errors. As the study progresses, the frequency of monitoring will be based on the results of previ-
ous data entry checks. If the error rate is unacceptable then the monitoring will increase until the error rate is acceptable
(less than 5% of all data entered). Data monitoring will consist of choosing a participant’s data, printing out all the data for
that participant from the database, and providing this print-out and the original forms to the PI for comparison purposes.
When inaccuracies are found, retraining will occur immediately and results will be monitored by the Project Director.
Subject Recruitment, Enrollment, and Assignment to Treatment Group. All patients being intubated (and subsequently
admitted to the MRICU, STICU, CSICU or NSICU) will be assessed for possible inclusion in the study. Because the inter-
vention is time-sensitive, study personnel assigned to enrollment will carry pagers for notification of intubations; the
pager numbers will be included on call lists for the rapid response team. Medical center respiratory therapists are rou-
tinely present at elective, urgent, and emergent intubation procedures; the Project Director will make routine rounds in
the units to identify potential subjects (patients anticipating elective or emergent intubation). In order to identify urgent
intubations, the Project Director will interact closely with the respiratory therapists on duty in the units and with the Uni-
versity Medical Center Rapid Response Team. The Project Director (or GRA on off shifts or weekends) will also round on
each unit for subject recruitment, and will be available via pager for notification by the MRICU, STICU, CSICU, NSICU and
respiratory therapy staff as well as the rapid response team about potential subjects. The Project Director will review
each subject’s medical record and confirm with the medical staff that the subject is age 18 or older and does not have a
clinical diagnosis of pneumonia; if there are no barriers to inclusion, the subject will be enrolled. Because the patient
undergoing intubation is generally incapacitated, family are not usually present at the time of intubation, study proce-
dures are associated with minimal risk (since the intervention involves timing of the first dose of an FDA-approved study
drug), and the intervention is time limited and must be initiated pre-intubation, a waiver of prospective written consent
will be sought from the IRB. The subject and the subject’s legally authorized representative (LAR) will be provided with an
oral explanation of the nature of the study and study information, and in writing, at the earliest opportunity. The informa-
tion will include all elements required for informed consent, and will include all pertinent contact information as well as
information about withdrawal from the study. If the subject or LAR does not wish continued participation in the study, no
additional interactions with the subject will take place, no follow-up data will be collected and that subject’s data will be
destroyed. We will seek consent for continued participation from the LAR and will invite the research subject to provide
his/her assent if capable. Further, subject’s willingness to continue participation will be assessed on an ongoing basis
throughout the project.
Once the subject has been enrolled, the Project Director will assign the subject to one of the two groups using a ran-
domization schedule generated by our biostatistician. A set of sequenced, sealed opaque envelopes will be prepared,
each containing the assignment of an individual subject. At the time of enrollment, the Project Director will open the next
Sample Protocols for Human and Animal Experimentation 455
envelope and proceed accordingly. The Biostatistician and the Data Manager will each keep a master copy of the ran-
domization assignment.
Study Processes. The Project Director or GRAs will recruit and enroll subjects and collect data. The Project Director (GRA
on off shifts and weekends) will complete all admission data collection including subject’s age, gender, ethnic background,
severity of illness score (APACHE III), reason for ICU admission, administration of antibiotics prior to entry into the study,
and type of intubation (emergent, oral vs. nasal). All baseline clinical data will be collected at the time of intubation, includ-
ing components for the CPIS (including endotracheal culture), and serum samples for measurement of selected biomarkers
will be collected and delivered to the Clinical Research Core for storage at –70C until analysis. The investigator scoring
chest radiographs, laboratory personnel, and all clinical caregivers will be blinded to subject group assignment.
Endotracheal aspiration of sputum for culture and gram stain (for the CPIS) will be obtained using a single use sterile
catheter as per the standard unit procedure (no saline will be used). Endotracheal specimens for culture and sensitivity
as well as Gram staining will be transported to the medical centers Clinical Support Laboratory by the Project Director or
GRA. Records of the Respiratory Therapy Department will be the source of data on mechanical ventilation. Data related
to description of the sample will also be collected each morning on all subjects. This will include ventilator support data
(ventilator mode and rate, type of support, PEEP, PSV, FiO2, PaO2, and SaO2); enteral nutrition data (presence, route, rate
and type of enteral nutrition, and highest daily gastric pH over the last 24 hours); and the presence of antibiotic, histamine
blocker, proton pump inhibitors, antacid, sucralfate and vasopressor therapy.
When the subject has been randomized to the intervention group, the prescribed pre-intubation intervention will be
performed by the Project Director (or GRAs on off shifts and weekends), who will not have any clinical responsibilities
related to the intubation. The intervention will be interspersed with the care team’s activities, and at no time will the
study personnel delay or interfere with the intubation procedure; if the needs and activities of providers are such that
the study personnel are unable to access the subject to provide CHX prior to intubation, the subject will be withdrawn
from the study. At all times we will place the subject’s need for medical treatment, and avoidance with interference
with treatment, foremost. For both groups, an order for 5 ml topical oral CHX 0.12% solution, beginning at least 12 hours
following intubation and continuing until extubation, will be entered on the subject’s medication administration record
to be administered by the clinical nurse. Further data collection will occur as scheduled as described in Table 1.
Control Group. Subjects will not receive any CHX prior to intubation. Administration of 5 ml of CHX gluconate (0.12%
solution) applied topically to the oral cavity will begin at least 12 hours after intubation and continue twice daily through-
out the study. Subjects will receive the usual oral comfort care as provided in each ICU. Data collection will occur as
described in the data collection schedule below.
Intervention Group. Will receive the pre-intubation intervention, which will consist of 5 ml of CHX gluconate (0.12% solu-
tion) applied topically to the oral cavity prior to intubation. CHX gluconate (0.12%) solution will be swabbed on all oral
surfaces by the Project Director/GRA. A defined swabbing method of application will be used. We developed procedures
for this method in the previous study. The actual intervention requires less than one minute to perform. Subjects will also
receive the usual oral comfort care as provided in each ICU.
Data management
Data forms include an admission form, the APACHE III form, a daily data form, the lab data form and a form to capture mor-
tality and discharge data (Appendix A). All data will be collected by subject study number without identifying personal infor-
mation. The PDA will be the primary data acquisition method. Visual as well as automated data verification of all data will
occur with each subject. All data will be downloaded into a relational database. The Clinical Research Core currently has
the data processing, software, database development tools, and expertise to provide this data management support.
The Data Manager in consultation with the Principal Investigator and the Biostatistician will develop reports that will
help in the coordination and management of the project and also allow project staff to monitor the quality of the data and
the progress of the study. Furthermore, only a unique identifier, assigned by the Principal Investigator or Data Manager, in
the database will identify each subject. The data files will be backed up daily during the data entry process and once a
week during other times by the Project Director. All data files will be housed on the university server which is backed up
456 Appendix IV
every 24 hours and copies are stored off-site for additional security. Access to the database will be limited to the investi-
gators, Project Director, and Data Manager.
Multi-Center Studies
N/A
1) Intervention: Oral application of 5 ml CHX gluconate 0.12% solution pre-intubation, and 5 ml CHX gluconate
0.12% solution twice a day following intubation.
2) Control: No pre-intubation intervention, 5 ml CHX gluconate 0.12% solution twice a day following intubation.
Sample Protocols for Human and Animal Experimentation 457
Subjects will remain in the study for five days or until extubation if extubated before five days. If extubated in the first
24 hours, a microbial culture of the endotracheal tube will be done. Data will be collected from the medical record daily;
a sample of serum (1 ml blood) will be obtained daily at the time of routine blood draw for clinical purposes. A sample of
sputum obtained at the time of suctioning for clinical indications will be obtained daily.
Subject population
The University Medical Center, where subject recruitment will occur, is a 875-bed tertiary care center that provides care
to more than 30,000 inpatients and emergency department patients and 500,000 outpatients per year and is the single
largest provider of indigent care in the state. Characteristics of inpatients at the Medical Center are presented in Table 2.
Patients in the projected study units are representative of the hospital wide patient characteristics in relation to gender
and ethnic background. Based on study unit characteristics and the investigators’ prior ICU research experience, it is
anticipated that the subjects selected for this study will be representative in both gender and ethnicity of the population
of patients at the Medical Center. The sample will be drawn from all patients over the age of 18 years admitted to the
MRICU, STICU, CSICU and NSICU at the University Medical Center who are being intubated and mechanically ventilated.
Both male and female subjects from all ethnic and racial backgrounds will be recruited. The exclusion criteria will be
clinical diagnosis of pneumonia at the time of intubation. Those who have a diagnosis of pneumonia at the time of intuba-
tion will be excluded because a new episode of superimposed VAP cannot be distinguished with certainty from worsen-
ing of the patient’s initial community acquired or nosocomial pneumonia.
Research material
Data will be obtained from the patient’s record, oral health exam, from biologic fluids (blood and endotracheal tube
aspirates collected for research purposes). ICU admission data will include the patient’s age, gender, ethnic back-
ground, severity of illness (APACHE III) score, reason for unit admission, administration of antibiotics prior to entry into
the study, and type of intubation (emergent, oral vs nasal). CPIS and nursing care data will be collected every day
during the study. Ventilator support data (ventilator mode and rate, type of support, PEEP, PSV, FiO2, PaO2, and SaO2),
enteral nutrition data (presence, route, rate and type of enteral nutrition, and highest daily gastric pH over the preced-
ing 24 hours); and data related to the presence of antibiotic, histamine blocker, proton pump inhibitors, antacid, and
vasopressor therapy will also be collected from the medical record each morning on all subjects.
Recruitment plan
The Investigators, Project Director or GRAs will recruit and enroll subjects. Participants and/or their families will be pro-
vided with a verbal explanation of the nature of the study. Informed consent for continued participation will be obtained
from the subject’s legally authorized representative (LAR) and a study information packet, including information about the
study, study withdrawal and contact numbers of investigators will be given to all subjects.
458 Appendix IV
Potential risks
There are minimal physical and psychological risks associated with this study. The only documented side effects of oral
administration of CHX are transient alterations in taste (dulling of taste sensation for several hours) and discoloration of
teeth and tongue similar to that which occurs with smoking and consumption of tannic acids such as tea, coffee and
wine. CHX discoloration is easily removed by professional dental hygiene. Removal of a total of 6 ml (6 samples of 1 ml
each) might contribute to anemia, but this small amount of blood (approximately one teaspoon) is less than daily ICU
blood drawing and blood will be aspirated through existing catheters not by venipuncture. Subjects may elect not to
participate and may withdraw from the study at any time without affecting the care they receive.
Risk reduction
To reduce risk, blood samples will not be drawn if hemoglobin levels are less than 10 mg/dl. The intervention will be inter-
spersed with the care team’s activities, and at no time will the study personnel delay or interfere with the intubation pro-
cedure; if the needs and activities of providers are such that the study personnel are unable to access the subject to
provide CHX prior to intubation, the subject will be withdrawn from the study. At all times we will place the subject’s need
for medical treatment, and avoidance with interference with treatment, foremost.
Confidentiality
Each participant will be assigned an arbitrary code number to ensure anonymity of the research data, and all research
data will be maintained in locked file cabinets under the direct supervision of the PI. Study information obtained will be
kept strictly confidential, and it will not be possible to identify any participant from the reports of publications that may
result from this research.
Privacy
All interactions with subjects and LARs will be conducted in the subject’s hospital room or a private area of the ICU.
Risk/benefit
There are minimal physical and psychological risks associated with this study. Benefits to participation include potential
reduction in the incidence of ventilator associated pneumonia in the treatment group and provision of post-intubation
CHX mouthwash to all subjects. The findings will be used to improve clinical practice in ways that might decrease the
incidence of pneumonia in patients receiving mechanical ventilation in the future.
Compensation plan
No subject compensation is planned.
Sample Protocols for Human and Animal Experimentation 459
Consent Issues
Consent process
The Investigators, Project Director or GRAs will recruit and enroll subjects. Study personnel will review each subject’s
medical record and confirm with the medical staff that the subject is age 18 or older and does not have a clinical diag-
nosis of pneumonia; if there are no barriers to inclusion, the subject will be enrolled. Because the patient undergoing
intubation is generally incapacitated, family are not usually present at the time of intubation, study procedures are
associated with minimal risk (since the intervention involves timing of the first dose of an FDA-approved study drug),
and the intervention is time limited and must be initiated pre-intubation, a waiver of prospective written consent is
sought from the IRB. The subject and the subject’s legally authorized representative (LAR) will be provided with an oral
explanation of the nature of the study and study information, and in writing, at the earliest opportunity. The information
will include all elements required for informed consent, and will include all pertinent contact information as well as
information about withdrawal from the study. If the subject or LAR does not wish continued participation in the study,
no additional interactions with the subject will take place, no follow-up data will be collected and that subject’s data
will be destroyed. The Principal Investigator and the study co-investigator have extensive experience in obtaining
consents from family members of critically ill adults, and have used the process described above (after approval of the
IRB) successfully in previous studies involving time-sensitive interventions with critically ill adults. In our experience,
potential subjects who are critically ill and approached for study inclusion, especially prior to and during the first 24
hours of intubation, are always sedated to some degree. In addition, their ability to communicate effectively through-
out the study is compromised by endotracheal intubation. As a result it has always been appropriate to discuss study
participation with the LAR. However, there may be rare occurrences when potential subjects are adequately oriented
and lucid to be able to provide informed consent. Therefore, we will evaluate the potential subject’s level of orientation
and response to our discussions of the study, and if the potential subject is able to respond in a manner that is clearly
understandable, we will use the potential subject’s own consent to continue participation. However, in any instance
where the potential subject’s ability to comprehend and communicate his/her desires is in question, we will seek con-
sent for continued participation from the LAR and will invite the research subject to provide his/her assent. Further,
subject’s willingness to continue participation will be assessed on an ongoing basis throughout the project. We will
follow the IRB Written Policies and Practices (WPP) and in the WPP, Section IZ-4, Item C, where the appropriate use
and definition of the LAR is outlined based on the state code (§11.1-1234). In the State Code, the LAR is defined and a
specific order of priority of representation is outlined.
If Request is being made to WAIVE SOME OR ALL ELEMENTS OF INFORMED CONSENT FROM SUBJECTS OR PERMIS-
SION FROM PARENTS
The proposed research, which involves timing of the first dose of a commonly administered antiseptic mouthwash, in-
volves no more than minimal risk to subjects. The rights and welfare of subjects are not adversely affected by timing of
the first dose of mouthwash (before or after intubation). Because the intervention is time-sensitive and must be accom-
plished before intubation when the subject is generally incapacitated and family are not usually present, the research
could not practicably be carried out without the waiver. The subject and the subject’s legally authorized representative
(LAR) will be provided with an oral explanation of the nature of the study and study information, and in writing, at the
earliest opportunity. The information will include all elements required for informed consent, and will include all pertinent
contact information as well as information about withdrawal from the study. If the subject or LAR does not wish continued
participation in the study, no additional interactions with the subject will take place, no follow-up data will be collected
and that subject’s data will be destroyed.
opportunity. The information will include all elements required for informed consent, and will include all pertinent contact
information as well as information about withdrawal from the study. If the subject or LAR does not wish continued partic-
ipation in the study, no additional interactions with the subject will take place, no follow-up data will be collected and that
subject’s data will be destroyed.
We request to WAIVE THE REQUIREMENT TO OBTAIN ASSENT from decisionally impaired subjects, who are unable to
provide assent.
In our experience, potential subjects who are critically ill and approached for study inclusion, especially prior to and
during the first 24 hours of intubation, are always sedated to some degree. In addition, their ability to communicate effec-
tively throughout the study is compromised by endotracheal intubation. The proposed research, which involves timing of
the first dose of a commonly administered antiseptic mouthwash, involves no more than minimal risk to subjects. The
rights and welfare of subjects are not adversely affected by timing of the first dose of mouthwash (before or after intuba-
tion). Because the intervention is time-sensitive and must be accomplished before intubation when the subject is gener-
ally incapacitated and family are not usually present, the research could not practicably be carried out without the
waiver. The subject and the subject’s legally authorized representative (LAR) will be provided with an oral explanation of
the nature of the study and study information, and in writing, at the earliest opportunity. The information will include all
elements required for informed consent, and will include all pertinent contact information as well as information about
withdrawal from the study. If the subject or LAR does not wish continued participation in the study, no additional interac-
tions with the subject will take place, no follow-up data will be collected and that subject’s data will be destroyed.
Genetic Testing
N/A
References
1. Tablan OC, Anderson LJ, Besser R, Bridges C, Hajjeh 7. Alvarez-Lerma F, Palomar M, Martinez-Pellus AE, et al.
R. Guidelines for preventing health-care–associated pneumo- Etiology and diagnostic techniques in intensive care-acquired
nia, 2003: recommendations of CDC and the Healthcare In- pneumonia: A Spanish multi-center study. Clin. Intensive Care
fection Control Practices Advisory Committee. MMWR 1997;8:164-70.
Recomm. Rep. 2004;53:1-36. 8. Cook DJ, Walter SD, Cook RJ, Griffith LE, Guyatt GH,
2. Cook D. Ventilator associated pneumonia: perspectives on Leasa D et al. Incidence of and risk factors for ventilator-
the burden of illness. Intensive Care Med. 2000;26 Suppl 1: associated pneumonia in critically ill patients. Ann. Intern. Med.
S31-S37. 1998;129:433-40.
3. Warren DK, Shukla SJ, Olsen MA, Kollef MH, Hollen- 9. Fourrier F, Duvivier B, Boutigny H, Rourrel-Delvallez
beak CS, Cox MJ et al. Outcome and attributable cost of M, Chopin C. Colonization of dental plaque: A source of nos-
ventilator-associated pneumonia among intensive care unit pa- ocomial infections in intensive care unit patients. Crit. Care
tients in a suburban medical center. Crit. Care Med. 2003;31: Med. 1998;26:301-08.
1312-17. 10. Scannapieco FA, Stewart EM, Mylotte JM. Colonization
4. Safdar N, Dezfulian C, Collard HR, Saint S. Clinical and of dental plaque by respiratory pathogens in medical intensive
economic consequences of ventilator-associated pneumonia: A care patients. Crit. Care Med. 1992;20:740-45.
systematic review. Crit. Care Med. 2005;33:2184-93. 11. Munro CL, Grap MJ, McClish D, Sessler CN. Chlor-
5. Alp E, Voss A. Ventilator associated pneumonia and infec- hexidine reduces ventilator associated pneumonia (VAP) in
tion control. Ann. Clin. Microbiol. Antimicrob. 2006;5:7. mechanically ventilated ICU adults. Crit. Care Med. 2006;34(12
6. Chevret S, Hemmer M, Carlet J, Langer M. Incidence suppl):A1.
and risk factors of pneumonia acquired in intensive care units. 12. Koeman M, van der Ven AJ, Hak E, Joore HC, Kaasjager
Results from a multicenter prospective study on 996 patients. K, de Smet AG et al. Oral decontamination with chlorhexi-
European Cooperative Group on Nosocomial Pneumonia. In- dine reduces the incidence of ventilator-associated pneumonia.
tensive Care Med. 1993;19:256-64. Am. J. Respir. Crit. Care Med. 2006;173:1348-55.
Sample Protocols for Human and Animal Experimentation 461
13. Fourrier F, Cau-Pottier E, Boutigny H, Roussel- nonprophylactic systemic antibiotic use in patients undergoing
Delvallez M, Jourdain M, Chopin C. Effects of dental plaque heart surgery. Am. J. Respir. Crit. Care Med. 1996;109:1556-61.
antiseptic decontamination on bacterial colonization and noso- 28. Houston S, Hougland P, Anderson JJ, LaRocco M,
comial infections in critically ill patients. Intensive Care Med. Kennedy V, Gentry LO. Effectiveness of 0.12% chlorhexi-
2000;26:1239-47. dine gluconate oral rinse in reducing prevalence of nosocomial
14. El-Solh AA, Pietrantoni C, Bhat A, Okada M, Zambon pneumonia in patients undergoing heart surgery. Am. J. Crit.
J, Aquilina A et al. Colonization of dental plaques: a reservoir Care 2002;11:567-70.
of respiratory pathogens for hospital-acquired pneumonia in 29. Segers P, Speekenbrink RG, Ubbink DT, van Ogtrop
institutionalized elders. Am. J. Respir. Crit. Care Med. 2004;126: ML, de Mol BA. Prevention of nosocomial infection in car-
1575-82. diac surgery by decontamination of the nasopharynx and oro-
15. Garcia R. A review of the possible role of oral and dental pharynx with chlorhexidine gluconate: a randomized controlled
colonization on the occurrence of health care-associated pneu- trial. JAMA 2006;296:2460-66.
monia: underappreciated risk and a call for interventions. Am. 30. Iacono VJ, Aldredge WA, Lucks H, Schwartzstein S.
J. Infect. Control 2005;33:527-41. Modern supragingival plaque control. Int. Dent. J. 1998;48:
16. Munro CL, Grap MJ, Elswick RK Jr., McKinney J, Ses- 290-97.
sler CN, Hummel RS III. Oral health status and develop- 31. Newman HN. The rationale for chemical adjuncts in
ment of ventilator-associated pneumonia: a descriptive study. plaque control. Int. Dent. J. 1998;48:298-304.
Am. J. Crit. Care 2006;15:453-60. 32. Fourrier F, Dubois D, Pronnier P, Herbecq P, Leroy O,
17. Bahrani-Mougeot FK, Paster BJ, Coleman S, Barbuto Desmettre T et al. Effect of gingival and dental plaque anti-
S, Brennan MT, Noll J et al. Molecular analysis of oral and septic decontamination on nosocomial infections acquired in
respiratory bacterial species associated with ventilator- the intensive care unit: a double-blind placebo-controlled mul-
associated pneumonia. J. Clin. Microbiol. 2007;45:1588-93. ticenter study. Crit. Care Med. 2005;33:1728-35.
18. Gipe B, Donnelly D, Harris S. A survey of dental health 33. Soto GJ. Diagnostic strategies for nosocomial pneumonia.
in patients with respiratory failure. Am. J. Respir. Crit. Care Curr. Opin. Pulm. Med. 2007;13:186-91.
Med. 1995;151:A340. 34. Micromedex. DrugDex Database. Micromedex 102. 1999.
19. Cardenosa Cendrero JA, Sole-Violan J, Bordes BA, 35. Stiefel DJ, Truelove EL, Chin MM, Zhu XC, Leroux
Noguera CJ, Arroyo FJ, Saavedra SP et al. Role of different BG. Chlorhexidine swabbing applications under various con-
routes of tracheal colonization in the development of pneumo- ditions of use in preventive oral care for persons with disabili-
nia in patients receiving mechanical ventilation. Am. J. Respir. ties. Spec. Care Dentist. 1995;15:159-65.
Crit. Care Med. 1999;116:462-70. 36. Owens J, Addy M, Faulkner J, Lockwood C, Adair R. A
20. Adair CG, Gorman SP, Feron BM, Byers LM, Jones DS, short-term clinical study design to investigate the chemical
Goldsmith CE et al. Implications of endotracheal tube bio- plaque inhibitory properties of mouthrinses when used as ad-
film for ventilator-associated pneumonia. Intensive Care Med. juncts to toothpastes: applied to chlorhexidine. J. Clin. Peri-
1999; 25:1072-76. odontol. 1997;24:732-37.
21. Ogata J, Minami K, Miyamoto H, Horishita T, Ogawa 37. Elworthy A, Greenman J, Doherty FM, Newcombe RG,
M, Sata T et al. Gargling with povidone-iodine reduces the Addy M. The substantivity of a number of oral hygiene prod-
transport of bacteria during oral intubation. Can. J. Anaesth. ucts determined by the duration of effects on salivary bacteria.
2004;51:932-36. J. Periodontol. 1996;67:572-76.
22. Wiener J, Itokazu G, Nathan C, Kabins SA, Weinstein 38. Stiefel DJ, Truelove EL, Chin MM, Mandel LS. Efficacy
RA. A randomized, double-blind, placebo-controlled trial of of chlorhexidine swabbing in oral health care for people with
selective digestive decontamination in a medical-surgical in- severe disabilities. Spec. Care Dentist. 1992;12:57-62.
tensive care unit. Clin. Infect. Dis. 1995;20:861-67. 39. Grap MJ, Munro CL, Elswick RK Jr., Sessler CN, Ward
23. Abele-Horn M, Dauber A, Bauernfeind A, Russwurm W, KR. Duration of action of a single, early oral application of
Seyfarth-Metzger I, Gleich P et al. Decrease in nosocomial chlorhexidine on oral microbial flora in mechanically venti-
pneumonia in ventilated patients by selective oropharyngeal de- lated patients: a pilot study. Heart Lung 2004;33:83-91.
contamination (SOD). Intensive Care Med. 1997;23: 187-95. 40. Pugin J, Auckenthaler R, Mili N, Janssens JP, Lew PD,
24. Pugin J, Auckenthaler R, Lew DP, Suter PM. Oropha- Suter PM. Diagnosis of ventilator-associated pneumonia by
ryngeal decontamination decreases incidence of ventilator- bacteriologic analysis of bronchoscopic and nonbronchoscopic
associated pneumonia. A randomized, placebo- controlled, “blind” bronchoalveolar lavage fluid. Am. Rev. Respir. Dis.
double-blind clinical trial. JAMA 1991;265:2704-10. 1991;143:1121-29.
25. Bergmans DC, Bonten MJ, Gaillard CA, Paling JC, van 41. Knaus WA, Wagner DP, Draper EA, Zimmerman JE,
der Geest S, van Tiel FH et al. Prevention of ventilator- Bergner M, Bastos PG et al. The APACHE III prognostic sys-
associated pneumonia by oral decontamination: a prospective, tem. Risk prediction of hospital mortality for critically ill hospi-
randomized, double- blind, placebo-controlled study. Am. J. talized adults. Am. J. Respir. Crit. Care Med. 1991;100: 1619-36.
Respir. Crit. Care Med. 2001;164:382-88. 42. Munro CL, Grap MJ, Jablonski R, Boyle A. Oral health
26. Schultz MJ, De Jonge E, Kesecioglu J. Selective decon- measurement in nursing research: state of the science. Biol. Res.
tamination of the digestive tract reduces mortality in critically Nurs. 2006;8:35-42.
ill patients. Crit. Care 2003;7:107-10. 43. Grap MJ, Munro CL, Hummel RS III, Elswick RK Jr.,
27. DeRiso AJ, Ladowski JS, Dillon TA, Justice JW, Peter- McKinney JL, Sessler CN. Effect of backrest elevation on the
son AC. Chlorhexidine gluconate 0.12% oral rinse reduces the development of ventilator-associated pneumonia. Am. J. Crit.
incidence of total nosocomial respiratory infection and Care 2005;14:325-32.
462 Appendix IV
This form may contain words that you do not understand. Please ask the study doctor or the study staff to explain any
words or information that you do not clearly understand. You may take home an unsigned copy of this form to think about
or discuss with family or friends before making your decision.
In this form, “you” always refers to the subject. If you are a legally authorized representative, please remember that
“you” refers to the study subject.
Procedures
Before your breathing tube was inserted, you were randomly assigned (like a flip of a coin) as to whether or not you would
get the antiseptic mouthwash (swabbed into your mouth using a foam swab) before tube insertion. You had an equal
chance of being assigned to either mouthwash before tube insertion or no mouthwash before tube insertion. Everyone
will get the antiseptic mouthwash swabbed into their mouths after the tube is inserted. Neither you, nor the study doctor
will know which group you are in. This information is available to the study doctor if needed in an emergency. This is done
(blinding) so that a fair evaluation of results may be made.
If your breathing tube is removed in less than 24 hours, we will save it to look at the bacteria on it.
For the next five days after the breathing tube is inserted, you will receive the antiseptic mouthwash twice a day; the
mouthwash will be applied with a foam swab. Information will be collected from your medical record (about your clinical
condition and what medications you are taking). Once every day, when you are having blood drawn for your clinical care,
we will take less than one additional teaspoon of blood to look for factors that might predict pneumonia. People who have
a breathing tube have to be suctioned out periodically; your nurse will do this as part of your routine care whether or not
you participate in this study. A small sample of mucus from your breathing tube (produced when the nurse does routine
suctioning), will be sent to the laboratory every day to identify any bacteria present.
gone a few hours after the mouthwash is discontinued. Allergic reaction to chlorhexidine is possible but very rare. Severe
allergic reactions can be life-threatening.
There may be side effects which are unknown at this time. Your condition may not get better or may become worse
while you are in this study.
Costs
The antiseptic mouthwash will be provided by the sponsor. There are no charges to you for the laboratory analysis of
samples from your breathing tube or blood samples which are being done for this study.
Alternatives
Your alternative is not to participate in the study. If you decide not to participate in this study, we will destroy all of the
samples we have taken and all of your research records. You do not have to participate in this study to receive the anti-
septic mouthwash.
Confidentiality
Data is being collected only for research purposes. Your data will be identified by a study ID number, not your name, and
stored separately from medical records in a locked research area. All personal identifying information will be kept in
password protected files and these files will be deleted after the study is completed. Access to all data will be limited to
study personnel. A data and safety monitoring plan is established.
You should know that research data or medical information about you may be reviewed or copied by the sponsor of the
research or by University Medical Center. Personal information about you might be shared with or copied by authorized
officials of the Department of Health and Human Services.
Although results of this research may be presented at meetings or in publications, identifiable personal information
pertaining to participants will not be disclosed.
Questions
In the future, you may have questions about your study participation. You may also have questions about a possible side
effect, reaction to study medication, or a possible research-related injury. If you have any questions, complaints, or con-
cerns about the research, contact:
PI Name
State University
School of Medicine
University City, USA
(888) 555-1234
If you have questions about your rights as a research subject, you may contact:
Office of Research
State University
School of Medicine
University City, USA
(888) 555-5678
You may also contact this number for general questions, concerns or complaints about the research. Please call this
number if you cannot reach the research team or wish to talk to someone else.
Additional information about participation in research studies can be found at http://www.appropriate-url.suv.edu.
###
1.0 Describe your proposed protocol, emphasizing the use of animals and including a brief statement of the
overall purpose of the study:
Study Objectives.
This study seeks to understand the properties of certain bacteria, particularly those that live in the mouth, that enable
them to occasionally cause a serious heart infection called infective endocarditis. There is currently no vaccine for this
disease, and the only method for preventing it is to give antibiotics to people at high risk for endocarditis when they go to
the dentist. However, we now realize that even though these bacteria are an important cause of endocarditis, most
Sample Protocols for Human and Animal Experimentation 465
people who get this disease don’t get it from a dental visit. Instead, it appears that these bacteria get into the bloodstream
and cause the infection from daily activities such as eating. We therefore need new targets to specifically prevent dis-
ease that would be safe to use every day for people at risk. Our research attempts to identify new targets by testing vac-
cine candidate proteins for their effectiveness in preventing disease in animals and by testing bacterial mutants to assess
the importance of the mutated genes for causing disease. Rats and rabbits are used. Catheterization of animals to pro-
duce minor heart valve damage is required to predispose the animals to endocarditis since, as with humans, animals with
normal hearts are not prone to disease.
rabbits are placed in a metal restrainer and are provided acepromazine as a sedative and to dilate the veins prior to inoc-
ulation and rats are placed in a spiral restrainer.
Two hours to 5 days later (for rabbits) or 4 hours to 1 day later for rats, animals will be euthanized, using CO2 inhalation
for rats and Euthasol injection for rabbits. For all animals, the chest cavity will be opened and infected cardiac tissue will
be removed for microbiological or microscopic analysis. In some cases, blood may be drawn immediately postmortem
from the right atrium. One spleen and kidney may also be removed postmortem for further analysis. Euthanasia will be
performed early if species-appropriate signs of pain are observed that are not corrected by buprenorphine injection.
Criteria for pain assessment are those found at https://www.univ.edu//Assessing_pain_and_distress.pdf for each spe-
cies. Rabbits will be assumed to be in pain if they are hunched, drag their hind legs, squeal, or face the back of the cage.
Rats will be assumed to be in pain if they squeak or squeal, run in circles, exhibit rounded backs, or are ataxic. In addition,
animals will be euthanized if found to be unresponsive or to demonstrate signs of stroke (a possible complication of
endocarditis).
Justification
1.0 Provide the reason for the experiment or activity and a description of the benefits to be gained. Provide
specific information regarding disease(s) to be studied, if applicable:
Endocarditis in humans is an important health problem. It is uniformly fatal if left untreated. Even in the present era of
antibiotic availability, it causes substantial pain and death. Recent studies have reported endocarditis death rates rang-
ing from 12 to 46%. It ranks as the fourth leading cause of life-threatening infectious disease syndromes in the U.S. Oral
streptococci are a leading cause of this disease. Treatment usually involves long courses of antibiotics and often also
requires surgical valve replacement.
There is no vaccine or other reliable method for disease prevention.
It is believed that two conditions are normally required for bacterial endocarditis to occur in humans: (1) there must be
a predisposing condition that results in a damaged heart valve (such as certain congenital heart defects, valve replace-
ment, degenerative valve disease, or rheumatic fever); and (2) bacteria must gain access to and be carried through the
bloodstream to the injured heart valve. More than 30 years ago, it was established that this was also true in rabbits. It was
noted that normal rabbits did not develop endocarditis despite intravenous inoculation with bacterial species known to
cause endocarditis in humans. Also it was determined that introduction of a catheter past the aortic valve caused minor
damage to the valve, and that if bacteria were inoculated into catheterized rabbits, reliable infection occurred. Thus, the
catheterization mimics the cardiac conditions that predispose humans to disease. We are using a minor variation of this
model.
Sample Protocols for Human and Animal Experimentation 467
2.0 Justify the selection of the proposed animal species, strain, and numbers, including statistical or other
justification for animal numbers in and a power analysis. Provide a justification of animal numbers across different
procedures justifying animal usage for each year, species/strain, and type of animal (e.g., adult, dam, pup, etc.):
The rabbit model is the most widely used for studying endocarditis, and the rat model is second most common.
We have used the rat model for virulence and vaccine testing. We routinely obtain 50% infection rates in unvaccinated
rats inoculated with virulent strains. If we want 90% power to detect a significant difference (with alpha = .05) between
this infection rate and a 10% infection rate exhibited by a mutant or obtained as a result of vaccination, then 25 rats are
required per group. Thus, a comparison of a virulent strain to a mutant or of an experimental vaccine to a sham vaccine
requires 50 rats. Logistically, this is about the maximum number of rats that we can catheterize in a day.
In contrast to the 50% infection rate and variability in number of bacteria recovered from the rat model, the rabbit model
exhibits almost 100% infectivity and consistent yields of ~10e8 bacteria per animal when a large inoculum of our virulent
strains is used. We are therefore using the rabbit model in most of our tests. For instance, we have used the rabbit model for
competitive index (CI) assays of virulence. In this test, the parent strain and a single mutant are co-inoculated at a 1:1 ratio.
The bacteria recovered from the infected heart are then enumerated to determine the ratio of wild type to mutant.
This provides a quantitative assessment of reduction in competitiveness. For example, a CI of 0.1 would indicate that
the mutant strain was 1/10 as competitive as the parental strain. Given an SD of 0.18 logs determined from previous exper-
iments, the use of 5 rabbits provides 95% power to detect as significantly different from 1 a CI of 0.4 and 6 rabbits would
provide 98% power. We would not be interested in virulence differences smaller than this. It will also be necessary to test
some mutants individually because the wild-type strain might compensate for the mutant’s defect when co-inoculated.
(For instance, if the wild-type strain produces a secreted product required for virulence, a mutant not producing this
product may grow normally in the presence of wild-type bacteria.) Using the rabbit model for these studies, we would
measure the number of cells recovered per animal. With 8 rabbits each assigned to the mutant and parent strain and a
standard deviation of 0.5 logs calculated from our previous experience, we would have 96% power to detect a difference
of 1 log in the number of bacteria recovered. We are set up to work with 12 rabbits at a time. Thus, it works well to com-
pare two mutants to a shared control in one 12-animal experiment, then repeat the experiment to obtain the necessary 8
animals per strain. This results in a total requirement of 12 rabbits per mutant tested. The same analysis would apply to
vaccine studies performed with rabbits. We have also used rabbits for microscopic analysis of lesions, as this can reveal
differences in pathology. We could expect to use 3 rabbits per strain for these studies. Three mutants could be compared
to a shared control in a 12-rabbit experiment. Finally, we may use up to 24 rabbits for blood draws.
This gives an indication of the number of animals required per experiment. The number of each type of experiment per-
formed will depend on funding and on our initial findings. If we are funded to continue with a vaccine study, we will likely use
the rat model. We have 10 to 15 vaccine candidates we are interested in testing. This would require 500 to 1000 rats if tested
individually. However, through the use of vaccine candidate pooling and shared controls, we believe we can reduce this
number to 300 rats over the next 3 years. We envision dividing 15 candidates into 3 pools of 5, which would be tested in 12
animals each and compared to 12 animals injected with a sham vaccine. This would require 48 animals (or 50, allowing for
some mortality). Repeating the experiment would result in each pool being tested in 24 animals, which should be sufficient.
We could then perform an analogous experiment with our top 3 candidates, again comparing all 3 to a shared control. This
would leave 100 rats for repeating this study, if needed, or for testing another 3 candidates. We will continue to use the rabbit
model to test mutant bacterial strains for virulence reduction. We have separate studies that will use this model to test dif-
ferent mutants. We will use the rabbit model for CI assays and individual inoculation experiments as described above. We
may also use rabbits for vaccine studies. Altogether, the number of rabbits we are requesting for these studies is:
CI assays:
50 mutants × 6 rabbits = 300 rabbits
Individual inoculation assays comparing two mutant strains to a shared control or vaccine studies, comparing two vac-
cine candidates to a shared sham vaccine control:
23 mutants or vaccine candidates × 12 rabbits = 276 rabbits
Microscopy, comparing four mutant strains to a shared control:
16 mutants × 4 rabbits = 64 rabbits
Blood draws = 24 rabbits
Total rabbits = 664
Note that these numbers represent upper limits. If we resume vaccine studies, we will perform fewer virulence assays.
However, since we can’t predict exactly what we will do over the next 3 years, we have requested the maximum number
of both species that we might need.
468 Appendix IV
3.0 Does this experiment duplicate previous experiments (other than control data):
Yes ● No
Database Search
1.0 Date search conducted for literature related to the three “R’s”:
7/19/2011
3.0 Keywords used in the search for literature for the three “R’s”:
PubMed:
“animal testing alternatives” (a MESH term) AND endocarditis endocarditis AND “in vitro model” endocarditis AND arti-
ficial AND model adjuvants AND rabbit AND alternative adjuvants AND rat AND alternative
(http://www.lib.ucdavis.edu/dept/animalalternatives/)
I also subscribe to the journal Lab Animal and I periodically attend Lunch and Learn sessions sponsored by the Animal
Resources Division, including a session on rodent surgery.
5.0 Based on the search results above and protocol planning, explain why you cannot replace your animal
model with a non-animal model or less sentient species:
None of the searches or sources listed above have provided alternatives to animal experimentation—that is, replace-
ment. There are some articles that have described in vitro models of endocarditis. A few years ago, I tested one such
model. I found that while it may be sufficient for testing of antibiotics, which is the purpose for which it was designed, it is
not appropriate for virulence testing. Another paper employed a fibrin matrix, which can be used as model for the attach-
ment step of endocarditis. Our studies require examination of later steps in addition to attachment, which are not
addressed.
6.0 Based on the search results above and protocol planning, explain why you cannot reduce the animal
numbers necessary for the experiment:
To attempt reduction, I have used power analyses in consultation with a statistician and competition assays to reduce
animal numbers to the bare minimum required. Further reductions are not possible.
7.0 Based on the search results above and protocol planning, explain why you cannot further minimize pain or
distress in the experiment:
I continue to look for refinements to our protocols in concert with our Animal Resources Division personnel to alleviate
suffering. The search above revealed no analgesic or anesthetic regimens superior to those we are currently using. For
Sample Protocols for Human and Animal Experimentation 469
vaccination, we continue to consider alternative to Freund’s Adjuvant. We now routinely use TiterMax as our first choice.
However, as is apparent from the above literature search, and sources such as Volume 46(3) of the ILAR J (2005, Immuni-
zation Procedures and Adjuvant Products), there is no adjuvant that is best for all antigens. We therefore must retain the
option to use Freund’s adjuvant if alternatives are not effective.
We have also considered the use of lower vertebrate animals for our studies. The rabbit model is the most widely used
for studying endocarditis, and the rat model is second most common. A PubMed search using the MESH terms “Endocar-
ditis, Bacterial”[MAJR] AND “Disease Models, Animal”[MeSH] yielded 117 articles when combined with “rabbit” and 26
articles when combined with “rat.” Adding the qualifier “NOT (rat OR rabbit)” to the search resulted in 54 articles. I re-
viewed all of them. Of those, four articles reported the use of dogs, two each used pigs and guinea pigs, and one article
each used calf, opossum, and mouse models. The guinea pig model would be of interest as involving a vertebrate lower
than rabbits, but it was less effective and more technically complex (employing catheterization followed by electrocoagu-
lation, as opposed to just catheterization in our model). The paper describing the mouse model was published in Dec, 2007
(Comp Med, 57(6):563-569). This model, which also employs cardiac catheterization, is attractive since it represents a lower
species. A collaborator at another institution has performed trial experiments with it, and I viewed echocardiograms from
a procedure on a recent visit to his lab. The procedure requires real-time imaging capabilities that we do not currently
possess, although I plan to follow up on this. Nevertheless, at the very least, I will need to continue to use the rabbit model
to complete ongoing studies from which we have already obtained data. If I could establish the mouse model, the results
would also need to be compared to those obtained from our current models, as my collaborator has indicated that grant
reviewers are reluctant to accept results from the mouse model until such comparisons have been made.
Documentation
Animal Groups
Instructions
NOTE: Once group details are complete, the copy button can be used to create a similar group.
Details Group Name Species # Yr 1 # Yr 2 # Yr 3 # Total Pain Category USDA
Rabbit Rabbits 221 221 222 664 D yes
Pain
Category D
Rat Rats 100 100 100 300 D no
Pain
Category D
New animal groups should be added only for new species or additional pain categories within species. Creating addi-
tional groups beyond this requirement makes submissions more difficult for PI’s and IACUC reviewers alike. Protocol
submissions with excessive groups may be returned to the PI for modification.
Group Details
1.0 List strain(s) in this group of animals:
Strain
New Zealand White
2.0 Age at final disposition (sacrifice or transfer) for this group of animals:
(select any that apply)
Juvenile
470 Appendix IV
3.0 Will this group of animals be fasted (food and/or water) or placed on a limited/special diet:
Yes ● No
5.0 Will the Animal Resources Division provide environmental enrichment for this group of animals:
● Yes No
6.0 What amount of time, if any, will this group of animals be held outside of the vivarium:
0 -11 Hours
USDA Determination
1.0 Group Species: Rabbits
Single Housing Justification
1.0 Provide a justification for single housing:
It is standard practice to house rabbits separately at our institution.
Group Drugs/Compounds
1.0 List ALL drugs/compounds used for this group of animals:
Biosafety
Drug Dose Route Frequency Duration Hazard Level
Complete Freund’s Adjuvant (CFA) 1mL of 50%, no SC Once 7 weeks Biological ABSL-1
(+ purified protein) more than 0.1mL
per site
Live bacteria, possibly containing up to 10e8 IV Once 2 hours to 5 days Biological ABSL-1
rDNA
TiterMax (+ purified protein) 1mL SC 3 times 7 weeks Biological ABSL-1
Live Bacteria: S. sanguinis, S. mutans, 500mg SC Once 7 weeks rDNA ABSL-2
S. mitis, S. salivarius, S. gordonii, S.
parasanguinis, S. bovis, S.
pneumoniae, Kingella kingae, A.
actinomycetemcomitans, E. faecalis +
Plasmid DNA/promoter pEMcat rDNA
providing antibiotic resistance
Buprenorphine 0.03mg/kg SC Twice daily 48 hours, then
PRN
Acetylpromazine ~2mg/kg SC Once 1 day
Ketamine HCl 50mg/kg or up to SC Once pre-op then Supplemental
25mg/kg supplemental
Xylazine 5mg/kg or up to SC Once pre-op then Supplemental
2.5mg/kg supplemental
Buprenorphine 0.0075mg/kg or up SC Once pre-op then Supplemental
to0.00375mg/kg supplemental
Glycopyrrolate 0.1mg/kg or up to SC Once pre-op then Supplemental
0.05mg/kg supplemental
Bupivacaine (0.5%) 0.5mL or up to SC Once pre-op then Supplemental
0.5mL supplemental
Euthasol 2mL at ~200mg/kg IV Once Terminal
procedure
Sample Protocols for Human and Animal Experimentation 471
2.0 Describe euthanasia method(s) for this group of animals and how carcasses will be disposed:
Method 1: Rabbits will be given 2 mg/kg acetylpromazine SC as a sedative and to dilate the ear veins. At least 10 minutes
later, a rabbit will be placed in a metal restrainer and immediately given an ear vein injection of 2 ml euthasol—equivalent
to ~200 mg/kg of sodium pentobarbital. Death occurs quickly—usually before the injection is complete.
Method 2, for experiments in which larger volumes of blood must be collected from catheterized rabbits: Rabbits will be
anesthetized with 2 mg/kg acetylpromazine as in method 1 followed by 180 mg ketamine + 18 mg xylazine SC (~60 and 6
mg/kg ketamine and xylazine, respectively). This will allow the animal to be prepped for necropsy and given 1 ml euthasol
IV in an ear vein without restraint. Heartbeat will be monitored by stethoscope. If the heart is still beating, another ml of
euthasol will be injected. Otherwise, thoracotomy will be performed, and blood will be quickly withdrawn from the right
atrium of the heart using an 18G needle attached to a 60-ml syringe.
Blood/Tissue Procedures
1.0 List any blood/tissue procedures that will be performed on this group of animals:
Blood/Tissue Information
1.0 Total number of animals estimated for this group:
664
Out of the total number of animals for this group, how many are estimated to undergo blood/tissue procedures:
664
Surgical Procedures
1.0 List any surgical procedures that will be performed on this group of animals:
Surgical Information
1.0 Total number of animals estimated for this group:
664
Out of the total number of animals for this group, how many are estimated to undergo surgical procedures:
664
9.0 How will the level of anesthesia be monitored and how often:
The surgeon will continuously monitor respiratory rate and rhythm, and will monitor the level of anesthesia during the
procedure by checking for absence of pedal reflexes at least every 15 minutes.
Surgical Information—Description
1.0 Describe surgical procedures:
Surgeries are performed in the surgical suite in room 4-051. For both species, anesthesia is given in the outer room. Once
animals are fully anesthetized, their necks are shaved using an electric clipper attached to the shop-vac. For rabbits, the
ears and abdomen are shaved as well to facilitate later injections and necropsy, and ophthalmic ointment is applied to the
eyes. For both species, betadyne is swabbed onto the shaved area and bupivacaine injected subcutaneously at the inci-
sion site. Animals are carried to the surgery room and placed on a sterile bottom drape. Surgeons don surgical gowns and
wear appropriate PPE, including sterile surgical gloves, shoe and head covers, mask, and goggles.
For rabbits, a sterile pack containing all surgical instruments, skin clips, sutures, and a sterility indicator is assembled
for each animal. Catheters and scalpels are supplied in individual, pre-sterile packaging. For rats, several sterile packs
are created. After each set is used, it is cleaned with disinfectant, rinsed with water, and placed in a “Germinator 500”
glass bead sterilizer for 2-10 seconds, as recommended by the manufacturer. The instruments are then removed and
placed in between top and bottom sterile drapes to cool for at least one minute prior to use. (The manufacturer states that
30 seconds is sufficient.) Handles will be oriented in the same direction to avoid contamination. Catheters for rats are cut,
pre-sealed, soaked in a high-level disinfectant, rinsed, and stored in a container of sterile water or PBS before use.
Once animals are in place and covered with a sterile top drape, an incision is made in the neck above the sternum. The
right carotid artery is gently dissected away from surrounding tissue and exposed. The artery is tied off with suture at the
head end, and clamped at the base of the neck or occluded with a forceps. A bent needle is used to introduce a catheter
into the artery. The clamp or forceps is loosened, and the catheter threaded through the artery until resistance is met,
indicating contact with the aortic valve or the ventricle wall. Sutures are tied around the artery and catheter at the base
of the neck in order to secure the catheter and prevent bleeding. For rabbits, the catheter is crimped, tied, and trimmed,
whereas the rat catheters are pre-cut to size and pre-sealed. With either animal, the short remaining head end of the
catheter is tucked under the subcutaneous tissue of the neck, and the incision closed with skin clips. The animal is re-
turned to its cage or carrier, and placed upon bench paper covering a warmed isothermal heat pad until fully recovered.
474 Appendix IV
Post-Surgical Procedures
1.0 List any post-surgical procedures that will be performed on this group of animals:
Post-Surgical Information
1.0 Total number of animals estimated for this group:
664
Out of the total number of animals for this group, how many are estimated to undergo post-surgical procedures:
640
3.0 Survival surgeries require sterile instruments and aseptic surgical techniques. Indicate how instruments
will be sterilized for each surgery:
For rabbits, a sterile pack containing all surgical instruments, skin clips, sutures, and a sterility indicator is assembled for
each animal. Catheters and scalpels are supplied in individual, pre-sterile packaging. After each set is used, it is cleaned
with disinfectant, rinsed with water, and placed in a “Germinator 500” glass bead sterilizer for 2-10 seconds, as recom-
mended by the manufacturer. The instruments are then removed and placed in between top and bottom sterile drapes to
cool for at least one minute prior to use. (The manufacturer states that 30 seconds is sufficient.) Handles will be oriented
in the same direction to avoid contamination.
4.0 Describe post-operative recovery from anesthesia, including frequency and type of observations. Also list
any lab tests, observations and management of potential experimental related disease, wound care, parenteral
fluids, special diet, etc.:
After surgery, animals are returned to the outer room of the surgical suite. They are placed in a carrier, which contains a
warmed isothermal pad underneath a sheet of absorbent paper.
At least every 15 minutes, animals are monitored for the following: respiration occurring at a normal, regular rate; lack
of bleeding from the incision site; normal color; movement of the head or other body parts; movement about the cage and
position within the cage; and posture. We have observed that it is especially important to prevent rabbits from burying
their noses in the corner of their carrier upon initial waking, which can result in suffocation. Assuming other parameters
are normal, when rabbits have achieved sternal recumbency, the thermal pads and papers are removed and animals are
returned to their room. At the end of the surgical day, animals are given buprenorphine injections.
6.0 Describe the management of post-operative pain in compliance with the institution’s post-operative
analgesia policy:
No special diet is required. Animals are assessed and provided additional buprenorphine injections every 12 hrs for 48
hrs. Activity level, posture, responsiveness, and presence of urine and feces are observed at each assessment. The neck
Sample Protocols for Human and Animal Experimentation 475
wound is assessed for signs of infection or hematoma. Most experiments end <18 hrs after the last required buprenor-
phine dose is administered. For experiments lasting longer, twice-daily assessment continues until euthanasia. If species-
appropriate signs of pain are observed, additional doses of buprenorphine will be provided every 12 hrs. If this does not
have the desired effect, or if the animal shows other signs of distress, such as labored breathing or abnormal movement
or responsiveness, it will be euthanized.
8.0 Describe the length of time the animal will be kept alive post-operatively:
2-7 days
Out of the total number of animals for this group, how many are estimated to undergo biological hazard
procedures:
640
2.0 Indicate the role of each biohazardous material or agent in the proposed study:
Complete Freund’s Adjuvant (CFA) and TiterMax are used as adjuvants for immunization in experiments designed to test
the efficacy of proteins for prevention of endocarditis. Our current study uses a pool of 10 proteins for each vaccine, re-
quiring a strong adjuvant. Thus, we expect to continue to need CFA for most of our vaccination experiments rather than
TiterMax. If new studies employing new individual test antigens are initiated, we will begin by trying TiterMax.
Immunization is followed by injection of animals with live bacteria. Lack of infection or lower bacterial loads in vacci-
nated animals compared to control, mock-vaccinated animals indicates vaccine efficacy. In other experiments designed
to test the role of selected bacterial genes in endocarditis causation, bacteria containing mutations in the genes of
476 Appendix IV
interest are injected into animals either singly or along with the parental or other mutant strains. These experiments re-
veal the relative virulence of the mutant strains.
Notes on compounds:
The purified proteins pose no known or suspected risks to the animals. The Freund’s complete adjuvant may produce in-
flammation at the site of injection. Animals will be monitored daily after injection. Any animal that shows signs of distress
will be given buprenorphine as an analgesic until the lesion resolves, following consultation with animal resource per-
sonnel. If the lesion does not resolve, the animal will be euthanized.
Freund’s incomplete adjuvant and Titermax list no known risks. However, animals will be monitored daily for inflam-
mation at injection sites. The CFA and TiterMax are alternative treatments, so animals will receive one or the other, not
both. The live bacteria used in these studies (usually Streptococcus sanguinis, but possibly strains of Streptococcus
mutans, Streptococcus mitis, Streptococcus salivarius, Streptococcus gordonii, Streptococcus parasanguinis, Strep-
tococcus bovis, Streptococcus pneumoniae, Aggregatibacter [Actinobacillus] actinomycetemcomitans, Kingella kin-
gae, or enterococci) are normally present in the mouth or GI tract of all humans, possess low virulence, and are
categorized as Biosafety level 1 or 2. At the high doses injected, the animals may develop fever. All animals will be
provided with buprenorphine before and after injection. Animals will be euthanized 2 hrs-5 days following injection of
bacteria and will be monitored daily. If an animal showed signs of unalleviated distress even after buprenorphine ad-
ministration, it would be euthanized earlier. Further, if we find that significant mortality occurs at 5 days post-inoculation,
a shorter period will be adopted for these experiments.
3.0 Describe potential adverse health effects on laboratory personnel, animal caretakers and/or animals and
indicate the degree and nature of the risk to the personnel:
Although listed above, the purified proteins and TiterMax pose no known or suspected risks to lab personnel, animal
caretakers, or the animals. The Freund’s complete adjuvant that may be used in the first vaccination can induce inflam-
mation if introduced intradermally or into the eyes, and can lead to a positive reaction to the standard TB skin test. Limited
risk to animal care workers is posed by possible exposure to residual CFA on animals and in bedding materials during
initial hours following administration.
The live bacteria used in these studies are normally present in the mouth or GI tract of all humans, possess low viru-
lence, and are categorized as Biosafety level 1 or 2. All bacterial strains and related rDNA manipulations will be handled
under BSL-2 conditions. Preparation of doses will be conducted within a certified biological safety cabinet (BSC) while
donning proper personal protective equipment. Following inoculation, contact with infected animals is unlikely to cause
disease. Euthanasia usually occurs less than 24 hrs after infection, so animals will likely develop fever, but will usually not
have time to develop other, more serious complications.
Rabbits will be monitored daily following injection of Freund’s complete adjuvant for signs of excessive inflammation at
the site of injection. Any animal that shows signs of distress will be euthanized or will be given buprenorphine as an anal-
gesic until the lesion resolves following consultation with animal resources personnel. All animals are euthanized 2 hrs-5
days following injection of bacteria.
4.0 Describe the containment procedures to be followed to protect other animals, personnel and the
environment from the hazardous agents; include monitoring methods, frequency, the name of the person
responsible for monitoring and biosafety assigned by the IBC:
Syringes are filled with bacteria or adjuvant in BSL2 conditions a biosafety hood in the lab using a 3-way stopcock. After
filling, capped needles are placed on each syringe; thus, there is no recapping of needles, only attachment of capped
needles to the filled syringes. Used syringes will be placed in approved sharps containers without recapping of the nee-
dle. Unused (extra) syringes will be placed in the sharps container without removing the cap.
Injection of Freund’s adjuvant or live bacteria will be performed while wearing eye protection and other PPE.
Animals will be injected with bacteria or CFA in a separate part of the room, away from other animals. During the
period prior to completion of first change of bedding workers will don PPE to include N-95 respirator, eye protection,
disposable coveralls, and gloves. Following completion of first bedding change significant exposure threats in relation
to this agent should be eliminated and animal care workers may follow standard Animal Resources Division
precautions.
Live Bacterial Strains and rDNA may be handled under ABSL-1 precautions in accordance with conditions established
in the Division’s SOP.
Sample Protocols for Human and Animal Experimentation 477
Out of the total number of animals for this group, how many are estimated to undergo rDNA procedures:
640
4.0 Describe nature of the inserted DNA sequence, i.e., what does the insertion code for and what are you
trying to accomplish:
Antibiotic resistance genes encoding resistance to chloramphenicol, kanaymycin, erythromycin, spectinomycin, or tetra-
cycline, and which are already found in nature in these species. These genes have one or two purposes. In all experi-
ments, the genes serve as markers to identify the bacteria that we introduce into the animal. In some cases, the antibiotic
resistance genes are also used to disrupt or “knock out” certain bacterial genes in order to determine the importance of
these genes for disease causation.
5.0 Describe vectors and hosts and their potential hazards to lab personnel, animal caretakers and/or animals
and indicate the degree and nature of the risk to the personnel:
The vectors are standard E. coli cloning vectors and plasmids found naturally in streptococci. In many instances, the an-
tibiotic resistance genes are inserted into the bacterial chromosome and no vector remains. The antibiotic resistance
genes were chosen because they are found in nature in the bacteria being studied. Because of this, the corresponding
antibiotics are not normally used clinically for the treatment of rare infections caused by these bacteria. If a lab worker
478 Appendix IV
were accidentally injected with these bacteria, he would be provided prophylactic antibiotics—normally a single dose of
amoxicillin. If the worker were allergic to that antibiotic, then he should avoid the use of erythromycin or tetracycline until
it is determined whether the inoculated strain carries a gene for resistance to one of these drugs.
There is no danger to workers in handling inoculated animals, since the bacteria are present at low or undetectable
levels in the animal’s blood 30 minutes after inoculation. Also, the disease under study (infective endocarditis) is non-
contagious, and therefore cannot be spread to workers or other animals.
The bacteria are normal inhabitants of the human mouth, are introduced into the bloodstream in small numbers and
swallowed in large numbers on a daily basis by all humans.
7.0 Describe safety precautions per NIH guidelines and IBC assigned biosafety levels:
For purposes of the recombinant DNA work, the Biosafety level is specified as Risk group 1. The streptococcal bacteria
would be classified as BSL1 or possibly BSL2. Work in the laboratory proceeds according to BSL2 guidelines, with han-
dling occurring in Class IIA hoods in rooms 407 and 409. The animal work is classified as ABSL-1. These studies have
been reviewed and approved by OEHS, most recently under MUA 123456, dated 12/06/07.
8.0 Describe procedures for storage and/or transport of genetically modified material or animals, both within
and outside of the institution, and their ultimate disposal:
The recombinant DNA is contained within the bacteria inoculated into the animals. The bacteria are handled and loaded
into syringes in Biosafety hoods in rooms 407 or 409, then carried in a closed container to the research building for injec-
tion. Injection occurs in the research building vivarium. Used syringes are placed in sharps containers for incineration.
Remaining bacteria are autoclaved.
Group Details
1.0 List strain(s) in this group of animals:
Strain
Sprague-Dawley
2.0 Age at final disposition (sacrifice or transfer) for this group of animals:
1 (select any that apply)
Adult
3.0 Will this group of animals be fasted (food and/or water) or placed on a limited/special diet:
Yes ● No
5.0 Will the Animal Resources Division provide environmental enrichment for this group of animals:
● Yes No
Sample Protocols for Human and Animal Experimentation 479
6.0 What amount of time, if any, will this group of animals be held outside of the vivarium:
0 -11 Hours
USDA Determination
Group Drugs/Compounds
1.0 List ALL drugs/compounds used for this group of animals:
2.0 Describe euthanasia method(s) for this group of animals and how carcasses will be disposed:
Euthanasia will be by CO2 inhalation using the chamber in the necropsy room. The recommended procedure will be used
and heartbeat will be monitored by touch prior to removal of rats from the chamber. No more than two animals will be
euthanized at the same time.
Blood/Tissue Procedures
1.0 List any blood/tissue procedures that will be performed on this group of animals:
Blood/Tissue Information
1.0 Total number of animals estimated for this group:
300
Out of the total number of animals for this group, how many are estimated to undergo blood/tissue procedures:
300
Surgical Procedures
1.0 List any surgical procedures that will be performed on this group of animals:
Surgical Information
1.0 Total number of animals estimated for this group:
300
Out of the total number of animals for this group, how many are estimated to undergo surgical procedures:
300
9.0 How will the level of anesthesia be monitored and how often:
The surgeon will continuously monitor respiratory rate and rhythm, and will monitor the level of anesthesia during the
procedure by checking for absence of pedal reflexes at least every 15 minutes.
Surgical Information—Description
1.0 Describe surgical procedures:
Surgeries are performed in the surgical suite in. Anesthesia is given in the outer room. Once animals are fully anesthe-
tized, their necks are shaved using an electric clipper attached to the shop-vac. The ears and abdomen are shaved as
well to facilitate later injections and necropsy, and ophthalmic ointment is applied to the eyes. Betadyne is swabbed onto
the shaved area and bupivacaine injected subcutaneously at the incision site. Animals are carried to the surgery room
and placed on a sterile bottom drape. Surgeons don surgical gowns and wear appropriate PPE, including sterile surgical
gloves, shoe and head covers, mask, and goggles.
A sterile pack containing all surgical instruments, skin clips, sutures, and a sterility indicator is assembled for each
animal. Catheters and scalpels are supplied in individual, pre-sterile packaging. For rats, several sterile packs are cre-
ated. After each set is used, it is cleaned with disinfectant, rinsed with water, and placed in a “Germinator 500” glass
bead sterilizer for 2-10 seconds, as recommended by the manufacturer. The instruments are then removed and placed in
between top and bottom sterile drapes to cool for at least one minute prior to use. (The manufacturer states that 30 sec-
onds is sufficient.) Handles will be oriented in the same direction to avoid contamination.
Once animals are in place and covered with a sterile top drape, an incision is made in the neck above the sternum. The
right carotid artery is gently dissected away from surrounding tissue and exposed. The artery is tied off with suture at the
head end, and clamped at the base of the neck or occluded with a forceps. A bent needle is used to introduce a catheter
into the artery. The clamp or forceps is loosened, and the catheter threaded through the artery until resistance is met,
indicating contact with the aortic valve or the ventricle wall. Sutures are tied around the artery and catheter at the base
of the neck in order to secure the catheter and prevent bleeding. The catheter is crimped, tied, and trimmed. The short
remaining head end of the catheter is tucked under the subcutaneous tissue of the neck, and the incision closed with skin
clips. The animal is returned to its cage or carrier, and placed upon bench paper covering a warmed isothermal heat pad
until fully recovered.
Post-Surgical Procedures
1.0 List any post-surgical procedures that will be performed on this group of animals:
Post-Surgical Information
1.0 Total number of animals estimated for this group:
300
Sample Protocols for Human and Animal Experimentation 483
Out of the total number of animals for this group, how many are estimated to undergo post-surgical procedures:
300
3.0 Survival surgeries require sterile instruments and aseptic surgical techniques. Indicate how instruments
will be sterilized for each surgery:
Several sterile packs containing all surgical instruments, skin clips, sutures, and a sterility indicator are assembled. Cath-
eters and scalpels are supplied in individual, pre-sterile packaging. After each set is used, it is cleaned with disinfectant,
rinsed with water, and placed in a “Germinator 500” glass bead sterilizer for 2-10 seconds, as recommended by the man-
ufacturer. The instruments are then removed and placed in between top and bottom sterile drapes to cool for at least one
minute prior to use. (The manufacturer states that 30 seconds is sufficient.) Handles will be oriented in the same direction
to avoid contamination. Catheters for rats are cut, pre-sealed, soaked in a high-level disinfectant, rinsed, and stored in a
container of sterile water or PBS before use.
4.0 Describe post-operative recovery from anesthesia, including frequency and type of observations. Also list
any lab tests, observations and management of potential experimental related disease, wound care, parenteral
fluids, special diet, etc.:
After surgery, animals are returned to the outer room of the surgical suite. They are placed in a cage, which contains a
warmed isothermal pad underneath a sheet of absorbent paper.
At least every 15 minutes, animals are monitored for the following: respiration occurring at a normal, regular rate; lack
of bleeding from the incision site; normal color; movement of the head or other body parts; movement about the cage and
position within the cage; and posture. Assuming other parameters are normal, when rats are moving about normally, the
thermal pads and papers are removed and animals are returned to their room. At the end of the surgical day, animals are
given buprenorphine injections.
6.0 Describe the management of post-operative pain in compliance with the institution’s post-operative
analgesia policy:
No special diet is required. Animals are assessed and provided additional buprenorphine injections every 12 hrs for 48
hrs. Activity level, posture, responsiveness, and presence of urine and feces are observed at each assessment. The neck
wound is assessed for signs of infection or hematoma. Most experiments end <18 hrs after the last required buprenor-
phine dose is administered. For experiments lasting longer, twice-daily assessment continues until euthanasia. If species-
appropriate signs of pain are observed, additional doses of buprenorphine will be provided every 12 hrs. If this does not
have the desired effect, or if the animal shows other signs of distress, such as labored breathing or abnormal movement
or responsiveness, it will be euthanized.
8.0 Describe the length of time the animal will be kept alive post-operatively:
2-7 days
Out of the total number of animals for this group, how many are estimated to undergo biological hazard procedures:
300
2.0 Indicate the role of each biohazardous material or agent in the proposed study:
Complete Freund’s Adjuvant (CFA) and TiterMax are used as adjuvants for immunization in experiments designed to test
the efficacy of proteins for prevention of endocarditis. Our current study uses a pool of 10 proteins for each vaccine, re-
quiring a strong adjuvant. Thus, we expect to continue to need CFA for most of our vaccination experiments rather than
TiterMax, especially for rats. If new studies employing new individual test antigens are initiated, we will begin by trying
TiterMax.
Immunization is followed by injection of animals with live bacteria. Lack of infection or lower bacterial loads in vacci-
nated animals compared to control, mock-vaccinated animals indicates vaccine efficacy. In other experiments designed
to test the role of selected bacterial genes in endocarditis causation, bacteria containing mutations in the genes of inter-
est are injected into animals either singly or along with the parental or other mutant strains. These experiments reveal the
relative virulence of the mutant strains.
Sample Protocols for Human and Animal Experimentation 485
Notes on compounds:
The purified proteins pose no known or suspected risks to the animals. The Freund’s complete adjuvant may produce in-
flammation at the site of injection. Animals will be monitored daily after injection. Any animal that shows signs of distress
will be given buprenorphine as an analgesic until the lesion resolves, following consultation with animal resources per-
sonnel. If the lesion does not resolve, the animal will be euthanized. Freund’s incomplete adjuvant and Titermax list no
known risks. However, animals will be monitored daily for inflammation at injection sites.
The CFA and TiterMax are alternative treatments, so animals will receive one or the other, not both.
The live bacteria used in these studies (usually Streptococcus sanguinis, but possibly strains of Streptococcus mu-
tans, Streptococcus mitis, Streptococcus salivarius, Streptococcus gordonii, Streptococcus parasanguinis, Streptococ-
cus bovis, Aggregatibacter [Actinobacillus] actinomycetemcomitans, or enterococci) are normally present in the mouth
or GI tract of all humans, possess low virulence, and are categorized as Biosafety level 1 or 2. At the high doses injected,
the animals may develop fever. All animals will be provided with buprenorphine before and after injection. Animals will be
euthanized 2 hrs-5 days following injection of bacteria and will be monitored daily. If an animal showed signs of unallevi-
ated distress even after buprenorphine administration, it would be euthanized earlier. Further, if we find that significant
mortality occurs at 5 days post-inoculation, a shorter period will be adopted for these experiments.
3.0 Describe potential adverse health effects on laboratory personnel, animal caretakers and/or animals and
indicate the degree and nature of the risk to the personnel:
Although listed above, the purified proteins and TiterMax pose no known or suspected risks to lab personnel, animal
caretakers, or the animals.
The Freund’s complete adjuvant that may be used in the first vaccination can induce inflammation if introduced intra-
dermally or into the eyes, and can lead to a positive reaction to the standard TB skin test. Limited risk to animal care
workers is posed by possible exposure to residual CFA on animals and in bedding materials during initial hours following
administration.
The live bacteria used in these studies are normally present in the mouth or GI tract of all humans, possess low viru-
lence, and are categorized as Biosafety level 1 or 2. All bacterial strains and related rDNA manipulations will be handled
under BSL-2 conditions. Preparation of doses will be conducted within a certified biological safety cabinet (BSC) while
donning proper personal protective equipment. Following inoculation, contact with infected animals is unlikely to cause
disease. Euthanasia usually occurs less than 24 hrs after infection, so rats will likely develop fever, but will usually not
have time to develop other, more serious complications. Rats will be monitored daily following injection of Freund’s com-
plete adjuvant for signs of excessive inflammation at the site of injection. Any animal that shows signs of distress will be
euthanized or will be given buprenorphine as an analgesic until the lesion resolves following consultation with animal
resources personnel. All animals are euthanized 2 hrs-5 days following injection of bacteria.
4.0 Describe the containment procedures to be followed to protect other animals, personnel and the
environment from the hazardous agents; include monitoring methods, frequency, the name of the person
responsible for monitoring and biosafety assigned by the IBC:
Syringes are filled with bacteria or adjuvant in BSL2 conditions a biosafety hood in the lab using a 3-way stopcock. After
filling, capped needles are placed on each syringe; thus, there is no recapping of needles, only attachment of capped
needles to the filled syringes. Used syringes will be placed in approved sharps containers without recapping of the nee-
dle. Unused (extra) syringes will be placed in the sharps container without removing the cap. Injection of Freund’s adju-
vant or live bacteria will be performed while wearing eye protection and other PPE.
Animals will be injected with bacteria or CFA in a separate part of the room, away from other animals. During the pe-
riod prior to completion of first change of bedding workers will don PPE to include N-95 respirator, eye protection, dispos-
able coveralls, and gloves. Following completion of first bedding change significant exposure threats in relation to this
agent should be eliminated and animal care workers may follow standard Animal Resources Division precautions.
Live Bacterial Strains and rDNA may be handled under ABSL-1 precautions in accordance with conditions established
in Animal Resources Division SOP.
3. Bedding and other materials contaminated with live bacterial strains and/or pEMCat plasmid/rDNA materials are to
be managed as regulated medical waste (RMW) and disposed of via incineration (red-bagging).
4. Bacterial Proteins: Special waste handling procedures are not required for animals exposed to bacterial proteins
in the absence of live bacteria, pEMCat plasmid, and CFA hazards.
5. Unwanted surpluses/stocks or waste material contaminated with greater than trace amounts of CFA will be dis-
posed of as hazardous chemical waste through OEHS.
Out of the total number of animals for this group, how many are estimated to undergo chemical hazard procedures:
300
2.0 Indicate the role of each hazardous chemical in the proposed study:
CFA may be used as an adjuvant for immunization in experiments designed to test the efficacy of proteins for prevention
of endocarditis. Our most recent study used a pool of 10 proteins for each vaccine, requiring a strong adjuvant. We may
need to use CFA for future vaccination experiments as well, although it will not be our first choice.
3.0 Describe potential adverse health effects on laboratory personnel, animal caretakers and/or animals and
indicate the degree and nature of the risk to the personnel:
The Freund’s complete adjuvant that may be used in the first vaccination can induce inflammation if introduced intrader-
mally or into the eyes, and can lead to a positive reaction to the standard TB skin test. Limited risk to animal care workers
is posed by possible exposure to residual CFA on animals and in bedding materials during initial hours following
administration.
Rats and rabbits will be monitored daily following injection of Freund’s complete adjuvant for signs of excessive inflam-
mation at the site of injection. Any animal that shows signs of distress will be euthanized or will be given buprenorphine
as an analgesic until the lesion resolves following consultation with animal resources personnel.
4.0 Describe the containment procedure to be followed to protect other animals, personnel, and the
environment from the hazardous chemicals including monitoring methods and frequency and the name of the
person responsible for monitoring:
Syringes are filled with CFA in BSL2 conditions a biosafety hood in the lab using a 3-way stopcock. After filling, capped
needles are placed on each syringe; thus, there is no recapping of needles, only attachment of capped needles to the
filled syringes. Used syringes will be placed in approved sharps containers without recapping of the needle.
Injection of CFA will be performed while wearing eye protection and other PPE. Animals will be injected with CFA in a
separate part of the room from other animals. During the period prior to completion of first change of bedding workers will
don PPE to include N-95 respirator, eye protection, disposable coveralls, and gloves. Following completion of first bedding
change significant exposure threats in relation to this agent should be eliminated and animal care workers may follow
standard Animal Resources Division precautions.
The investigator performing the study will be responsible for monitoring.
2. Complete Freunds Adjuvant: Bedding and other waste materials generated through first bedding change will be
managed as regulated medical waste (RMW) and disposed of via incineration (red-bagging) only. Following the
first bedding change special handling of bedding is not required.
3. Unwanted surpluses/stocks or waste material contaminated with greater than trace amounts of CFA will be dis-
posed of as hazardous chemical waste through OEHS.
4. Resources
Research universities and research institutions typically maintain websites that are rich in information and resources
important to the conduct of research that uses either human or animal subjects. So checking your institution’s website is
a recommended first step. Content typically includes:
• Guidelines for obtaining approval and authorization to use human or animal subjects in research, including links to
institutional requirements, regulatory agencies, funding agencies, and applicable laws.
• Information on and access to training that is required prior to conducting research involving humans or animals.
Such training may involve online programs, lecture series, workshops, or courses. There also may be training
modules that deal with the review process, especially if submission and review of the protocol is electronic.
• Links to institutional forms needed to seek authorization to do subjects-based research.
• Policies and procedures of the IRB and the IACUC including review schedules and general logistics.
• Standard operating protocols that apply to the conduct of research involving human or animal subjects.
• Instructions and materials needed to address issues of noncompliance arising during the course of the research,
including inappropriate use of animals or unexpected or adverse events associated with the use of humans.
• Information on protocol development and preparation to assist you in skill building. Samples of approved protocols
may be posted as models for writing your own protocol. Some institutions offer the services of office staff to assist
in protocol development or protocol prereview. Similar types of assistance may include prereview services pro-
vided by the IRB or the IACUC.
• Information, policies, and forms on topics that may have relevance to human or animal subjects research including
conflict of interest, safety and biohazards, and issues of privacy and confidentiality.
Federal policy, guidance, compliance oversight, and other useful information may be found at the websites of the Office
for Human Subjects Research and the Office of Laboratory Animal Welfare. Both of these offices fall under the authority
of the U.S. Department of Health and Human Services.
http://www.hhs.gov/ohrp/humansubjects/index.html
http://grants.nih.gov/grants/olaw/olaw.htm
Selected examples of institutional websites dealing subjects protections may be found at the following URLs.
Vanderbilt University
https://www4.vanderbilt.edu/irb/
University of Pittsburgh
http://www.iacuc.pitt.edu/
488 Appendix IV
University at Buffalo
http://www.research.buffalo.edu/rsp/default.cfm
University of Wisconsin
http://www.grad.wisc.edu/respolcomp/hrpp/
appendix V
Scientific Integrity: Text and Cases in Responsible Conduct of Research, 4th ed.
by Francis L. Macrina
© 2014 ASM Press, Washington, DC
doi:10.1128/9781555818487.AppV
489
490 Appendix V
or help understand the invention. These are like figures in a scientific paper.
Another similarity to scientific papers is that a patent specification usually
contains data and information presented in the form of tables.
The specification begins with a descriptive title. It then lists the inven-
tor and may list the assignee, if the inventor has assigned or transferred
ownership in the invention to another. The inventor is the person or per-
sons who conceived and reduced the invention to practice either by the
filing of a patent application or by developing and testing the invention.
The assignee is the organization (or person) to which the property rights
of the patent are granted. In a university setting, the inventor and the
assignee have usually worked out an agreement for the sharing of profits
associated with the use or licensing of the patent. The inventor and the
assignee could be one and the same. Patents, like scientific publications,
have a brief abstract summarizing the invention and how it works.
The “Background” section of the specification is what we might call an
extended version of the “Introduction” in a scientific paper. This section
contains a discussion of the relevant literature to the field or area of “art.”
A variation of this latter terminology is “prior art,” which strictly means
references or other documentation that the PTO or a court (or possibly
the patent applicant) considers to be a barrier to the patentability of the
claimed invention. In the Chakrabarty specification, a glossary was in-
cluded in the “Background” section to aid in understanding the rest of the
specification. Next, there is a brief summary of the invention. Then there
is a description of the invention, referred to as the “preferred embodi-
ment.” This is the section where the inventor explains how the invention
works or operates. The description here must be detailed and thorough.
The presentation must be precise enough that someone “skilled in the art”
can practice the invention. A patent specification must fully disclose every-
thing needed to replicate and use the invention. This section ends with a
summation of the invention, emphasizing its advantages and use.
A patent specification concludes with a description of the claims associ-
ated with the invention. These numbered sentences or sentence fragments
precisely define the nature of the invention and its uses. In other words,
the claims are what others will be prevented from making, using, selling, or
importing should the patent be granted. Only the inventor (or assignee)
will have the right to exclude others from carrying out the actions listed in
the claims once patent protection is awarded. Even the inventor and
assignee may be excluded from practicing the claimed invention, if it is
dominated or considered to be within the claims of a broader invention in
a patent to another party.
To fulfill the requirements for a patent application, the patent applicant
must also pay a filing fee and provide a signed oath that the inventor(s) is
the original and first true inventor of the claimed invention.
492 Appendix V
Example of a U.S. Patent Specification 493
494 Appendix V
Example of a U.S. Patent Specification 495
496 Appendix V
Example of a U.S. Patent Specification 497
498 Appendix V
Example of a U.S. Patent Specification 499
500 Appendix V
Example of a U.S. Patent Specification 501
appendix VI
The following instructions for keeping laboratory notebooks are used by the re-
search division of a company.
The primary purpose of this lab notebook is to protect your and the com-
pany’s patent rights by keeping clear, complete, and legible records of all
original work in a form acceptable as evidence if any legal conflict arises.
The laboratory notebook is the exclusive property of the company and
must not leave the premises. Laboratory notebooks must be stored away
from risk of damage by chemicals, heat, water, etc. Notebooks not in use
are stored in a locked fireproof cabinet with authorized access by person-
nel. Their contents are not to be disclosed to anyone without written au-
thorization by an officer of the company. You are responsible for the safe
keeping and maintenance of the notebook. Report immediately its damage
or loss to your supervisor. It is a legal document which is valuable in estab-
lishing invention dates. As such, it must be signed and dated daily by the
contributing scientist, and then signed weekly by another scientist who has
witnessed the experiment and/or reviewed the data. These records may be
crucial in determining dates of invention on which a patent claim may
depend.
It is essential to document the progress of an experiment, beginning
with the objective, explanation of the method and materials, results and
discussion, and conclusion. This should be written in a clear and concise
manner so that it can be followed by another scientist with duplication of
results at a later date. The laboratory notebook is also a permanent record
Scientific Integrity: Text and Cases in Responsible Conduct of Research, 4th ed.
by Francis L. Macrina
© 2014 ASM Press, Washington, DC
doi:10.1128/9781555818487.AppVI
503
504 Appendix VI
the test of . . .” to clearly indicate that the person not only reviewed
the data but actually saw the test performed.
23. Some notes on signing and dating the notebook:
• Sign and date each entry, such as new ideas or inventions, at the
end of each day.
• Sign and date each page at the bottom as it is completed.
• Have a witness and/or scientist not working on the project read
and understand the entries; sign and date each page weekly.
24. Do not disclose the notebook and its contents to anyone outside the
company unless you are authorized by the organization. You must
return the notebook when you have finished with it, upon request, or
upon termination of your employment. It should be kept in a pro-
tected place. If loss occurs, notify your supervisor immediately and
prepare a written report describing the circumstances of the loss.
25. The departmental head or his or her designee may perform unan-
nounced auditing of notebooks in circulation if necessary.
Appendix 1
Specific Instructions Regarding
Chemistry Notebooks
Additional Resources
Overview
Scientific Integrity: Text and Cases in Responsible Conduct of Research, 4th ed.
by Francis L. Macrina
© 2014 ASM Press, Washington, DC
doi:10.1128/9781555818487.AppVII
509
510 Appendix VII
Resources
making sure all trainees, investigators, and staff complete training that al-
lows them to understand and deal with the hazards associated with their
work. And staff includes administrative personnel who handle hazardous
materials for nonexperimental purposes such as shipping, receiving, stock-
ing, and inventorying.
Another player in laboratory safety is the institution itself, specifically the
administrative infrastructure responsible for the oversight of the workplace
environment. The form and substance of safety training is determined by
the institution at which you work. The responsibilities associated with safety
training, compliance, inspections and monitoring, investigations, and acci-
dent remediation generally rest in a single office or division. Names of these
vary, but common constructs are “Occupational Health and Safety” and
“Environmental Health and Safety.” They ensure that the government-
sponsored safety polices are in place, monitored, and enforced. They also
produce safety manuals and guidance materials, develop and deploy
institution-specific safety policies, and deliver training in person or provide
various training platforms (e.g., online training modules) to meet safety
needs. Sometimes training modules are “homegrown,” while other types of
instructional delivery are outsourced to vendors who provide all the needed
materials, usually via an electronic interface or electronic media. Many insti-
tutions keep their online training on secure servers, accessible only to insti-
tutional members by electronic ID and password. Some allow their training
to be in the public domain, allowing open access.
Compiled below are a variety of resources that deal with laboratory
safety topics and training. This compilation is intended to familiarize you
with the kinds of resources that may be useful in allowing you to maintain
the highest standards of safety when working in the research laboratory.
However, it is important that you complete whatever training is specifi-
cally prescribed and required by your institution. Rely on your supervisor
to help guide you to these resources. And never assume that completion of
a training module that you have discovered in the public domain may be a
substitute for the requirements of your institution’s training programs.
General resources
The Centers for Disease Control and Prevention (CDC) provides a num-
ber of publications and resources that deal with workplace safety.
Chemical safety
http://www.cdc.gov/niosh/topics/chemical-safety/
Biosafety
http://www.cdc.gov/biosafety/publications/index.htm
Laboratory Safety Resources 513
The Topline Edition of the 2012 UC, BioRAFT and NPG Lab Safety Sur-
vey Data:
http://figshare.com/articles/THE_TOPLINE_EDITION_OF_THE_2012_UC
_BIORAFT_AND_NPG_LAB_SAFETY_SURVEY_DATA/105431
Duke University
http://www.safety.duke.edu/safetymanuals/Lab/default.htm
Harvard University
http://vpr.harvard.edu/pages/environmental-health-safety
Princeton University
http://web.princeton.edu/sites/ehs/index.html
Laboratory Safety Resources 515
Purdue University
https://www.purdue.edu/rem/index.htm
Stanford University
http://www.stanford.edu/dept/EHS/prod/
University of Georgia
http://esd.uga.edu
University of Washington
https://www.ehs.washington.edu/
Training modules
Lab Safety Workspace offers an ensemble of online safety training courses
that are free but require registration.
http://labsafetyworkspace.org/
517
518 Index
Recombinant DNA Molecule Program Advisory Respect for Persons principle, 137
Committee, 368 Responsibility, scientist, 361–364
Record keeping, 329–359 Responsible conduct of research, 18–21
case studies of, 45–46, 351–357 Rest, James, on moral reasoning, 40
data books for, 335–336 Rest’s Four-Component Model of Morality, 40
chemistry, 506–507 Retraction, in publication, 121–122
correspondence in, 345 Review
definition of, 332–334 institutional boards for, see Institutional review
electronic, 346–347, 350 boards/committees
format for, 340–344 of manuscript, see Peer review
instructions for, 503–507 Risk(s), of research, 362
master log book, 338 Risk-to-benefit ratio
organization of, 338–339 for animal experimentation, 177–178
sample pages from, 348–349 for human subject research, 144
tangible data in, 332, 339–340 Rockefeller University Press, 94–95
witnessing, 344–346 Rubacha, Michael, on ELNs, 350
data in Russell, William, on animal experimentation, 190–
definition for, 332–334 191
forms of, 332–334 Ryan, Kenneth J., report on misconduct, 11
ownership of, see Ownership, of data and
intellectual property S
storage and retention of, 335 Safety
electronic, 346–347, 350 of genetic tests, 372
importance of, 329 laboratory, 509–515
interactions with other people, 344–346 psychological, in collaborative research, 264
legal issues in, 331 Salami science, 85
methodology notebook, 338–339 San Francisco Declaration on Research Assessment,
for patent application, 317 120–121
policies for, 336–337 Schachman, Howard, on responsible science, 6
publications on, 330 Science, definition of, 1
reasons for, 330–332 Scientific conflict, in collaborative research, 269–
recommendations for, 49 271
sources for, 506 Scientific method, 5–7
standards for, 434–435 Scientist responsibility, 361–364
survey forms for, 392, 409–410 Secrecy, in business-sponsored research, 212–213
tools for, 335–336 Security
writing instruments for, 336 in animal experimentation facilities, 195–196
Reduction, in animal experimentation guidelines, in publication, 95–96
191 Senior (primary) author, 101–103
Referees, see Peer review Sensitivity, moral, 40
Refinement, in animal experimentation guidelines, Seok, Junhee, on animal rights, 186
191 Serial advancement, of research, 288
Regan, Tom, on animal rights, 30, 174, 178–181 Server-based archives, 116–117
Regulations, noncompliance with, as scientific Service marks, vs. trade marks, 297–298
misconduct, 12–13 Shamoo, Adil, on responsible conduct, 28
Reiser, Stanley, on scientist responsibility, 363 Sharing
Reliability, 37 of data, see Data sharing
Replacement, in animal experimentation guidelines, of research materials, 92
190–191 Shop right laws, for patents, 307
Reporting science, 7–9, 49 Singapore Statement on Research Integrity, 38, 48–50
Repositories, in publication, 115–116 Singer, Maxine, at Gordon Conference, 367
Research, integrity in, 18–19 Singer, Peter, on animal rights, 30, 173–174, 176–
Research Councils UK, 115–116 177
Resnick, Davis Site license, for software, 303
on dual-use review policy, 96 Situational ethics (utilitarianism), 32–34, 176–178
on responsible conduct, 28 Skloot, Rebecca, on confidentiality, in testing, 375
Index 529