Optimising cohort data in Europe

In this context, temporal trust checkpoints can give participants the means to exert their rights for data control even in studies with digital data collection technologies. That is, both participants and research institutions should be involved in sequencing processes that will integrate data control parameters into the research process with minimal communication. First, data control is negotiated and checked in a time-patterned sequence where the researchers and the participants’ output occur independently (because researchers and participants are assigned to different time slots). The aim is to make participants' expectations about privacy and data uses both explicit and negotiable through discussions and consultations. Once a temporal sequence for data control is established and repeated, it can be turned into a routine. Such a routine will ensure that even a small number of researchers’ and participants’ choices will activate trust enforcing processes. That is, participants should have a strong understanding of what their rights for privacy are and if their expectations can or cannot be implemented in a particular context. In general terms, we can thus conclude that Pillar II does not need versatile resources in order to provide ethical, methodological and legal guidelines for cohort data access. At first glance, this relative lack of importance of versatile resources may seem counterintuitive. Pillar II targets a large audience with different research aims and as such, seems to require versatile resources that can be applied to a wide range of contexts. A central characteristic of Pillar II however, is the increasing importance of intangible resources. Intangible resources are often (but not exclusively) associated to ethical parameters such as trust. Such intangible resources are often highly specialised because they are personal and relational. Participants' feelings of trust are unlikely to be the same across situations and depend on existing research arrangements. Pillar II aims to provide guidance to conditions for access and as such requires acceptance from its purported audience. Intangible specialised resources thus provide a specific and relational anchor into the conditions for access for participants and researchers alike. Specialised tangible resources require a lot of integration and combinative capabilities while intangible resources are generally leveraged through integrative capabilities. This may be explained by the interactive relationship between these two resource types. Namely, many components of Pillar II result intangible resources made tangible (e.g. "Interim metrics of impact for research benefits"). An example of such process is to leverage future rather than present research benefits. This requires biding the social value of research to specific civic responsibilities and thus transforming this social value. Judgements on the social value of research do not only rely on a clear scientific consensus of research value but also on an ethical consensus regarding the impact of research in the future (usually implemented through Research Ethics Committees). The tangibility and specification of social value can thus be determined by Research Ethics Committees. However, why should intangible resources be converted into tangible ones? This is because intangible resources tend to rely on tacit knowledge and as such, cannot be

Made with FlippingBook flipbook maker