StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Informed consent. The possible dangers of too much information conveyed - Research Paper Example

Comments (0) Cite this document
Summary
Informed consent is an issue that has many facets. While the truism is that informed consent is generally good, there is some research which suggests that there is a limit to how much a patient should be informed…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.1% of users find it useful
Informed consent. The possible dangers of too much information conveyed
Read TextPreview

Extract of sample "Informed consent. The possible dangers of too much information conveyed"

Download file to see previous pages rug. Moreover, there is an issue with how much comprehension a participant may have of the risks that are dictated in the informed consent protocol. Not surprisingly, the forms must be readable in order for a patient to truly have considered himself “informed,” and the most important part of readability is to put the risks into layman’s terms. Studies have suggested that esoteric forms which are more difficult to read than complicated texts results in considerably less informed consent than forms which are not so. Therefore, it is important to pay attention to the level of language used in the consent forms and keep the audience in mind. If the person drafting these forms keeps in mind this golden rule, then other studies suggest that informed consent is extremely effective. The possible dangers of too much information conveyed Loftus & Fries (2008) theorize that informed consent may do more harm than good, at least when the risks that are presented to the patient consist of all potential risks that might occur, no matter how remote. They argue that the patient might imagine that he or she is experiencing the symptom because of the power of the mind, in that the mind can play tricks on people, and, if the patient knows that a certain risk is possible, then the patient may conjure this risk even though it is only remotely possible that the patient is actually experiencing the symptom. As proof of this, they point to the power of the placebo (Loftus & Fries, 2008, p. 217). To them, a patient is better off just knowing the general level of risk, ie, the symptoms that are likely to occur, and only provide patients the remote risks if the patient specifically asks for it. Therefore, the informed consent carries risks itself, and they “only ask that those whose task it is to formulate informed consent rituals pay some attention to the harm that may be caused by the ritual itself” (Loftus & Fries, 2008, p. 217). Loftus & Fries then cited a study that they performed that was unpublished. It involved patients at the Stanford University Medical School who were diagnosed with scleroderma and were treated with a drug cocktail consisting of propranolol and alpha-methyldopa. The patients were informed about the side effects of the drug cocktail, which included dizziness, headaches, upset stomach and tearfulness. Some patients received a standard informed consent form and some received a standard informed consent form plus a special message which explained the placebo effect, in that the patients who received the special message were informed of the phenomenon of experiencing symptoms simply because the symptoms were mentioned. Loftus & Fries found that all patients experienced “side effects,” even if the patient was given a placebo. They also found that those patients who received the special message experienced fewer side effects than those who did not (Loftus & Fries, 2008, p. 218). Therefore, their point about a patient knowing “too much” was validated. While Loftus & Fries concentrated on the placebo effect as a drawback for informed consent, at least informed consent that lists every possible side-effect, no matter how remote, Audrey et al. (2008) concentrated on the effect informed consent had on patients who want to undergo palliative chemotherapy. The issue that Audrey et al. focuses upon is ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Informed consent. The possible dangers of too much information Research Paper”, n.d.)
Retrieved from https://studentshare.org/education/1427450-what-research-exists-to-support-the-efficacy-of
(Informed Consent. The Possible Dangers of Too Much Information Research Paper)
https://studentshare.org/education/1427450-what-research-exists-to-support-the-efficacy-of.
“Informed Consent. The Possible Dangers of Too Much Information Research Paper”, n.d. https://studentshare.org/education/1427450-what-research-exists-to-support-the-efficacy-of.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Informed consent. The possible dangers of too much information conveyed

Effective Alignment of Information Technology

Considering reports and issues such as privacy regulations, data protection, risk management compliance, project management and governance, information security, business continuity management and effective corporate governance, an effective IT infrastructure seems to be the primary tool for the implementation of practical and strategic solutions. An updated IT infrastructure is important for improving corporate governance and shareholder returns (Kaen 2003; Trites, 2004).
According to the Global Corporate Governance Principles, "Corporate governance" refers to the "relationship among various participants in determining the direction and performance of corporations. The primary participants are (1) the shareholders, (2) the m...
44 Pages(11000 words)Research Proposal

The Widespread Use of Information Communication Technology

An increasing number of frauds is an example of an alarming situation. All these have a far-reaching impact on the employees, on businesses and on people. 

On the work front, the advantages of ICT cannot be overlooked in maintaining and implementing successful quality programs. Customer-driven standards, customer-supplier links, the prevention of error, quality at the source, and continuous improvement are some of the principles that are put into practice (Laudon & Laudon, 2000 cited by Iles & Healy, 2004). IC T facilitates the production process, helps meet benchmarking standards, make constant upgradation based on customer demands. The internet has revolutionized not just the selling of goods and services...
9 Pages(2250 words)Essay

Pressure Group Have Too Much Access to Politicians

They are financed, at least partially, by taxes and/or contribution based on some measure of the ability to pay, and some or all of their services are distributed on the basis of need rather than effective demand” (p. 2).

Angelica (2004), on the contrary, says that nonprofit organizations are financially dependent on government grants and contributions from individuals and corporations. Through collaboration, nonprofit organizations are now becoming more business-like. Although they have the status of nonprofit that provides the most services at the least possible price (Shim & Siegel, 1997), they operate in a business-like manner as said by Nadder. But they still have some distinction from the for-profit ente...
13 Pages(3250 words)Literature review

Information Systems Development Process

When a project has an obvious objective to be attained and the effort is very small, common sense and attention to what the client wants can be a suitable alternative to more complicated and formal methods. However, when the software system becomes more complex, the objectives are multiplied and start to depend on different configurations and circumstances, it becomes imperative to structure the development effort to avoid software development that does not answer the clients need, or does not have the requisite level of quality, or becomes impossible to forecast in terms of time and budget – or a combination of any of the preceding.

In situations of complexity in software development, structure methods seek to im...
13 Pages(3250 words)Assignment

Management Information System

At the beginning of the twentieth century, the revolution began in knowledge and information then accelerated gradually thereafter. It became now the foundation for many new services and products wherein 1974 applications pushed the limits of human ability. As an information system, research advanced so did user expectations. And the question raised is how individuals, the organization can adjust in order to leverage the delivery of information technology.

The infrastructure of the information technology (IT) affords the base for an organization to construct its information system needed to complete the work and provide the employee with all the necessary information. However, management decisions regarding IT are very...
12 Pages(3000 words)Assignment

The Dangers and Negative Characteristics of Ethno-Nationalism

Ethnonationalism results in prejudice and intolerance and eventually brings about bloody conflict between members of the different ethnic groups.
The difference between ethnonationalism and plain nationalism which may refer to citizen, civic or territorial nationalism is that while the latter results from a rational association of people, the former perceived itself as bound by a common historic origin. While civic (or territorial) nationalism is voluntary and open itself to anyone who wishes to join it, ethnonationalism, on the other hand, makes compulsory the inclusion of members of the same origin and the exclusion to those who do not (Rydgren 2004 mp 133).
According to KecManovic, there are five primary tenets of eth...
12 Pages(3000 words)Case Study

Info-Point: Marketing of New Touch Screen Information Technology

The development of the new Info-Point technology, a stand-alone information module designed to offer the public information on tourism, local shopping, weather, and transportation, has created the opportunity to successfully market these information technologies to different UK cities. The entire marketing concept is to establish self-service information centers that offer a wide variety of regional information, utilizing an easy-to-use touch screen methodology to cater to a broad mass market of consumers. 

Touch screen interface systems are becoming more and more common in the UK and abroad. During a pilot experiment using touch screen information technology, the automotive manufacturer Lexus piloted an informatio...
10 Pages(2500 words)Report

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages(2500 words)Research Paper

Information Security Policy of Organization

In the modern age of information technology, there are many threats created for organizational information. Organizations need a security model that has the capability to handle and secure our information reserves. Technical administrative safety /security measures like security plans, actions and procedures are the general practices for the organizational information security procedures. The attentiveness of producing actions is concerned by the organizations to an appreciably smaller level, on the other hand at the same time these are weighed up as being further efficient organizational actions than technical administrative ones. Information security encompasses organizational features, officially authorized aspects, institution...
6 Pages(1500 words)Research Paper

Global Employee Information and Consultation: Replicating the European Model

A significant step to enhancing the employees’ right to information and consultation is the establishment of the European Works Council (EWC). The EWC Directive (94/45/EC) aims to improve cooperation in transnational companies and to allow trade unions to influence, at least indirectly, the decision-making of corporations (Lockwood and Williams). It requires community-scale undertakings and community-scale groups of undertaking to create this mechanism for regular consultation of the workforce. A ‘community-scale undertaking’ is one with at least 1,000 employees within the Member States and at least 150 employees in each of at least two Member States (Lewis and Sargeant).

An EWC is a forum that would a...
9 Pages(2250 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Informed consent. The possible dangers of too much information conveyed for FREE!

Contact Us