VULNERABILITY IN RESEARCH AND HEALTH CARE; DESCRIBING THE ELEPHANT IN THE ROOM?

ABSTRACT Despite broad agreement that the vulnerable have a claim to special protection, defining vulnerable persons or populations has proved more difficult than we would like. This is a theoretical as well as a practical problem, as it hinders both convincing justifications for this claim and the...

Full description

Saved in:
Bibliographic Details
Published inBioethics Vol. 22; no. 4; pp. 191 - 202
Main Author HURST, SAMIA A.
Format Journal Article
LanguageEnglish
Published Oxford, UK Blackwell Publishing Ltd 01.05.2008
Subjects
Online AccessGet full text

Cover

Loading…
Abstract ABSTRACT Despite broad agreement that the vulnerable have a claim to special protection, defining vulnerable persons or populations has proved more difficult than we would like. This is a theoretical as well as a practical problem, as it hinders both convincing justifications for this claim and the practical application of required protections. In this paper, I review consent‐based, harm‐based, and comprehensive definitions of vulnerability in healthcare and research with human subjects. Although current definitions are subject to critique, their underlying assumptions may be complementary. I propose that we should define vulnerability in research and healthcare as an identifiably increased likelihood of incurring additional or greater wrong. In order to identify the vulnerable, as well as the type of protection that they need, this definition requires that we start from the sorts of wrongs likely to occur and from identifiable increments in the likelihood, or to the likely degree, that these wrongs will occur. It is limited but appropriately so, as it only applies to special protection, not to any protection to which we have a valid claim. Using this definition would clarify that the normative force of claims for special protection does not rest with vulnerability itself, but with pre‐existing claims when these are more likely to be denied. Such a clarification could help those who carry responsibility for the protection of vulnerable populations, such as Institutional Review Boards, to define the sort of protection required in a more targeted and effective manner.
AbstractList Despite broad agreement that the vulnerable have a claim to special protection, defining vulnerable persons or populations has proved more difficult than we would like. This is a theoretical as well as a practical problem, as it hinders both convincing justifications for this claim and the practical application of required protections. In this paper, I review consent-based, harm-based, and comprehensive definitions of vulnerability in healthcare and research with human subjects. Although current definitions are subject to critique, their underlying assumptions may be complementary. I propose that we should define vulnerability in research and healthcare as an identifiably increased likelihood of incurring additional or greater wrong. In order to identify the vulnerable, as well as the type of protection that they need, this definition requires that we start from the sorts of wrongs likely to occur and from identifiable increments in the likelihood, or to the likely degree that these wrongs will occur. It is limited but appropriately so, as it only applies to special protection, not to any protection to which we have a valid claim. Using this definition would clarify that the normative force of claims for special protection does not rest with vulnerability itself, but with pre-existing claims when these are more likely to be denied. Such a clarification could help those who carry responsibility for the protection of vulnerable populations, such as Institutional Review Boards, to define the sort of protection required in a more targeted and effective manner. Reprinted by permission of Blackwell Publishers
Despite broad agreement that the vulnerable have a claim to special protection, defining vulnerable persons or populations has proved more difficult than we would like. This is a theoretical as well as a practical problem, as it hinders both convincing justifications for this claim and the practical application of required protections. In this paper, I review consent‐based, harm‐based, and comprehensive definitions of vulnerability in healthcare and research with human subjects. Although current definitions are subject to critique, their underlying assumptions may be complementary. I propose that we should define vulnerability in research and healthcare as an identifiably increased likelihood of incurring additional or greater wrong. In order to identify the vulnerable, as well as the type of protection that they need, this definition requires that we start from the sorts of wrongs likely to occur and from identifiable increments in the likelihood, or to the likely degree, that these wrongs will occur. It is limited but appropriately so, as it only applies to special protection, not to any protection to which we have a valid claim. Using this definition would clarify that the normative force of claims for special protection does not rest with vulnerability itself, but with pre‐existing claims when these are more likely to be denied. Such a clarification could help those who carry responsibility for the protection of vulnerable populations, such as Institutional Review Boards, to define the sort of protection required in a more targeted and effective manner.
ABSTRACT Despite broad agreement that the vulnerable have a claim to special protection, defining vulnerable persons or populations has proved more difficult than we would like. This is a theoretical as well as a practical problem, as it hinders both convincing justifications for this claim and the practical application of required protections. In this paper, I review consent‐based, harm‐based, and comprehensive definitions of vulnerability in healthcare and research with human subjects. Although current definitions are subject to critique, their underlying assumptions may be complementary. I propose that we should define vulnerability in research and healthcare as an identifiably increased likelihood of incurring additional or greater wrong. In order to identify the vulnerable, as well as the type of protection that they need, this definition requires that we start from the sorts of wrongs likely to occur and from identifiable increments in the likelihood, or to the likely degree, that these wrongs will occur. It is limited but appropriately so, as it only applies to special protection, not to any protection to which we have a valid claim. Using this definition would clarify that the normative force of claims for special protection does not rest with vulnerability itself, but with pre‐existing claims when these are more likely to be denied. Such a clarification could help those who carry responsibility for the protection of vulnerable populations, such as Institutional Review Boards, to define the sort of protection required in a more targeted and effective manner.
Despite broad agreement that the vulnerable have a claim to special protection, defining vulnerable persons or populations has proved more difficult than we would like. This is a theoretical as well as a practical problem, as it hinders both convincing justifications for this claim and the practical application of required protections. In this paper, I review consent-based, harm-based, and comprehensive definitions of vulnerability in healthcare and research with human subjects. Although current definitions are subject to critique, their underlying assumptions may be complementary. I propose that we should define vulnerability in research and healthcare as an identifiably increased likelihood of incurring additional or greater wrong. In order to identify the vulnerable, as well as the type of protection that they need, this definition requires that we start from the sorts of wrongs likely to occur and from identifiable increments in the likelihood, or to the likely degree, that these wrongs will occur. It is limited but appropriately so, as it only applies to special protection, not to any protection to which we have a valid claim. Using this definition would clarify that the normative force of claims for special protection does not rest with vulnerability itself, but with pre-existing claims when these are more likely to be denied. Such a clarification could help those who carry responsibility for the protection of vulnerable populations, such as Institutional Review Boards, to define the sort of protection required in a more targeted and effective manner.Despite broad agreement that the vulnerable have a claim to special protection, defining vulnerable persons or populations has proved more difficult than we would like. This is a theoretical as well as a practical problem, as it hinders both convincing justifications for this claim and the practical application of required protections. In this paper, I review consent-based, harm-based, and comprehensive definitions of vulnerability in healthcare and research with human subjects. Although current definitions are subject to critique, their underlying assumptions may be complementary. I propose that we should define vulnerability in research and healthcare as an identifiably increased likelihood of incurring additional or greater wrong. In order to identify the vulnerable, as well as the type of protection that they need, this definition requires that we start from the sorts of wrongs likely to occur and from identifiable increments in the likelihood, or to the likely degree, that these wrongs will occur. It is limited but appropriately so, as it only applies to special protection, not to any protection to which we have a valid claim. Using this definition would clarify that the normative force of claims for special protection does not rest with vulnerability itself, but with pre-existing claims when these are more likely to be denied. Such a clarification could help those who carry responsibility for the protection of vulnerable populations, such as Institutional Review Boards, to define the sort of protection required in a more targeted and effective manner.
Despite broad agreement that the vulnerable have a claim to special protection, defining vulnerable persons or populations has proved more difficult than we would like. This is a theoretical as well as a practical problem, as it hinders both convincing justifications for this claim and the practical application of required protections. In this paper, I review consent-based, harm-based, and comprehensive definitions of vulnerability in healthcare and research with human subjects. Although current definitions are subject to critique, their underlying assumptions may be complementary. I propose that we should define vulnerability in research and healthcare as an identifiably increased likelihood of incurring additional or greater wrong. In order to identify the vulnerable, as well as the type of protection that they need, this definition requires that we start from the sorts of wrongs likely to occur and from identifiable increments in the likelihood, or to the likely degree, that these wrongs will occur. It is limited but appropriately so, as it only applies to special protection, not to any protection to which we have a valid claim. Using this definition would clarify that the normative force of claims for special protection does not rest with vulnerability itself, but with pre-existing claims when these are more likely to be denied. Such a clarification could help those who carry responsibility for the protection of vulnerable populations, such as Institutional Review Boards, to define the sort of protection required in a more targeted and effective manner. Adapted from the source document.
Despite broad agreement that the vulnerable have a claim to special protection, defining vulnerable persons or populations has proved more difficult than we would like. This is a theoretical as well as a practical problem, as it hinders both convincing justifications for this claim and the practical application of required protections. In this paper, I review consent-based, harm-based, and comprehensive definitions of vulnerability in healthcare and research with human subjects. Although current definitions are subject to critique, their underlying assumptions may be complementary. I propose that we should define vulnerability in research and healthcare as an identifiably increased likelihood of incurring additional or greater wrong. In order to identify the vulnerable, as well as the type of protection that they need, this definition requires that we start from the sorts of wrongs likely to occur and from identifiable increments in the likelihood, or to the likely degree, that these wrongs will occur. It is limited but appropriately so, as it only applies to special protection, not to any protection to which we have a valid claim. Using this definition would clarify that the normative force of claims for special protection does not rest with vulnerability itself, but with pre-existing claims when these are more likely to be denied. Such a clarification could help those who carry responsibility for the protection of vulnerable populations, such as Institutional Review Boards, to define the sort of protection required in a more targeted and effective manner. [PUBLICATION ABSTRACT]
Author HURST, SAMIA A.
Author_xml – sequence: 1
  givenname: SAMIA A.
  surname: HURST
  fullname: HURST, SAMIA A.
  email: samia.hurst@medecine.unige.ch
  organization: Institute for Biomedical Ethics at the Geneva Medical School, Switzerland
BackLink https://www.ncbi.nlm.nih.gov/pubmed/18405317$$D View this record in MEDLINE/PubMed
BookMark eNqNkl9v0zAUxS00xLrBV0ARD7ylXNuxHQsBSjOviQgpygIIXqz8caR0bTOSVnTffg4dQ9pLd19sy79zruVzz9DJptsYhBwMU2zr3XKKPS5cn2E5JQD-FIBTPN0_Q5OHixM0AcKlKwWQU3Q2DEuwJRl7gU6x7wGjWEzQ4vu3JFVZMIuTOP_pxKmTqSsVZGHkBOmFE6kgySMnDDL13rlQV2EWz-J07uSRclSivkZBmo-i8ZwtFl8-vUTPm2I1mFf36znKL1UeRm6ymMdhkLgVIwy7hLCiajzghBJRgyhrT_pV3XAOjJSlJ8uGeDUVxOOsqEtaUl6YmtSkMBVuCD1Hbw-2N333e2eGrV63Q2VWq2Jjut2gBXhSApFHQSaofQSmR0FqLTlj_ChIQGDMASz45hG47Hb9xv6KxtLmAFL4Fnp9D-3Ktan1Td-ui_5W_0vIAv4BqPpuGHrT_EdAj8Ogl3rMXI-Z63EY9N9h0Hsr_fhIWrXbYtt2m21ftKunGHw4GPxpV-b2yY31LF4ou7N696Bvh63ZP-iL_lpzQQXTP9K5Dn8RBukc9Gd6BzMM0kM
CODEN BIETEE
CitedBy_id crossref_primary_10_1017_S0963180115000523
crossref_primary_10_1111_jocn_13677
crossref_primary_10_3390_laws12010002
crossref_primary_10_1038_s41591_019_0543_y
crossref_primary_10_3389_frma_2023_1237742
crossref_primary_10_1177_1757975920963886
crossref_primary_10_1093_jhuman_huw007
crossref_primary_10_2196_31231
crossref_primary_10_1111_jlme_12025
crossref_primary_10_1177_1049732314538122
crossref_primary_10_1080_15265161_2022_2063434
crossref_primary_10_1177_0907568216631027
crossref_primary_10_1093_nc_niz013
crossref_primary_10_3384_de_ethica_2001_8819_248159
crossref_primary_10_1080_15265161_2014_964880
crossref_primary_10_1080_08989621_2019_1679121
crossref_primary_10_1016_j_puhe_2018_02_023
crossref_primary_10_1093_phe_phn037
crossref_primary_10_1186_s12916_019_1317_6
crossref_primary_10_1186_s12939_015_0277_5
crossref_primary_10_1007_s10728_017_0342_x
crossref_primary_10_1186_s12910_024_01018_y
crossref_primary_10_1186_s13010_019_0075_6
crossref_primary_10_1007_s10202_012_0109_2
crossref_primary_10_1007_s11019_012_9448_y
crossref_primary_10_1016_j_hrthm_2011_01_005
crossref_primary_10_1186_s12910_016_0148_7
crossref_primary_10_3389_fpsyg_2023_1149746
crossref_primary_10_1007_s11673_015_9641_9
crossref_primary_10_1002_eahr_500208
crossref_primary_10_1080_09672559_2020_1846985
crossref_primary_10_1016_j_sciaf_2022_e01324
crossref_primary_10_1186_s12910_023_00910_3
crossref_primary_10_1177_1556264619869130
crossref_primary_10_1017_S096318011500050X
crossref_primary_10_36615_jcsa_v41i2_1422
crossref_primary_10_1136_bmjopen_2017_021172
crossref_primary_10_7202_1078377ar
crossref_primary_10_1177_26323524221097982
crossref_primary_10_3389_fpsyt_2025_1485270
crossref_primary_10_3390_su14127499
crossref_primary_10_3390_cancers14174325
crossref_primary_10_1007_s11017_019_09502_y
crossref_primary_10_1177_16094069231183600
crossref_primary_10_1186_1752_4458_7_7
crossref_primary_10_1017_S1474746416000592
crossref_primary_10_1080_15265161_2012_665143
crossref_primary_10_1111_josp_12393
crossref_primary_10_1177_17470161231188720
crossref_primary_10_1002_eahr_500040
crossref_primary_10_1371_journal_pone_0248702
crossref_primary_10_1007_s11569_016_0275_0
crossref_primary_10_1007_s11673_023_10297_w
crossref_primary_10_1016_j_jemep_2014_09_003
crossref_primary_10_1186_s40639_017_0041_3
crossref_primary_10_1177_1609406920931254
crossref_primary_10_1186_s12910_022_00819_3
crossref_primary_10_3109_14767058_2011_602442
crossref_primary_10_1186_s12910_019_0416_4
crossref_primary_10_1525_jer_2013_8_5_28
crossref_primary_10_1177_13591053231225903
crossref_primary_10_3389_fsoc_2018_00039
crossref_primary_10_1136_jme_2023_109146
crossref_primary_10_1186_s12910_021_00716_1
crossref_primary_10_1186_s13063_018_2563_1
crossref_primary_10_1186_s12909_018_1431_8
crossref_primary_10_1002_leap_1580
crossref_primary_10_1177_17407745241284798
crossref_primary_10_1080_17441692_2014_887137
crossref_primary_10_1111_1475_6773_13616
crossref_primary_10_1016_j_socscimed_2023_116388
crossref_primary_10_7202_1051279ar
crossref_primary_10_1080_15265161_2011_634954
crossref_primary_10_1371_journal_pone_0035864
crossref_primary_10_1136_medethics_2016_103955
crossref_primary_10_1007_s11019_020_09995_8
crossref_primary_10_1111_wvn_12209
crossref_primary_10_1016_j_bioet_2018_12_001
crossref_primary_10_1177_1556264620902657
crossref_primary_10_1007_s00481_014_0331_7
crossref_primary_10_1086_686753
crossref_primary_10_1093_phe_phu012
crossref_primary_10_1186_s12910_023_00972_3
crossref_primary_10_1016_j_outlook_2008_10_005
crossref_primary_10_1080_14708477_2024_2381091
crossref_primary_10_2979_intjfemappbio_5_2_1
crossref_primary_10_1093_inthealth_ihaa052
crossref_primary_10_1111_jgs_17451
crossref_primary_10_12968_jokc_2018_3_4_208
crossref_primary_10_1057_s41296_022_00568_3
crossref_primary_10_1111_j_1752_7325_2011_00248_x
crossref_primary_10_7202_1051283ar
crossref_primary_10_1108_JSM_05_2016_0199
crossref_primary_10_1007_s00481_023_00770_w
crossref_primary_10_1016_j_healthpol_2015_04_007
crossref_primary_10_1007_s40592_025_00235_4
crossref_primary_10_1186_s12939_021_01567_3
crossref_primary_10_3390_rel16020137
crossref_primary_10_1080_10376178_2019_1670709
crossref_primary_10_1016_j_rmal_2022_100028
crossref_primary_10_1017_S0954579420001893
crossref_primary_10_1186_s13148_025_01840_0
crossref_primary_10_12968_bjom_2014_22_12_870
crossref_primary_10_1186_s12910_018_0245_x
crossref_primary_10_1007_s00520_022_06937_3
crossref_primary_10_1016_j_outlook_2020_08_018
crossref_primary_10_1136_medhum_2023_012683
crossref_primary_10_1053_j_ajkd_2019_04_019
crossref_primary_10_21703_issn2735_6337_2024_n45_05
crossref_primary_10_1038_s41415_019_0529_7
crossref_primary_10_35295_osls_iisl_0000_0000_0000_1254
crossref_primary_10_1016_S1473_3099_14_70766_2
crossref_primary_10_1111_j_1748_720X_2009_00346_x
crossref_primary_10_1080_00346764_2021_1943755
crossref_primary_10_1371_journal_pone_0280056
crossref_primary_10_1007_s00761_009_1694_0
crossref_primary_10_1093_ije_dyy167
crossref_primary_10_1177_0098858820975532
crossref_primary_10_1080_15265161_2022_2075977
crossref_primary_10_1136_medethics_2021_107953
crossref_primary_10_1007_s11019_016_9750_1
crossref_primary_10_1016_j_ssmph_2019_100366
crossref_primary_10_2105_AJPH_2012_301200
crossref_primary_10_1007_s00481_014_0334_4
crossref_primary_10_1177_0969733020976180
crossref_primary_10_1080_15265161_2017_1388869
crossref_primary_10_1080_21507716_2010_482871
crossref_primary_10_1136_medethics_2019_105374
crossref_primary_10_1016_j_vaccine_2016_09_039
crossref_primary_10_1080_21550085_2023_2200725
crossref_primary_10_1017_S0963180109090252
crossref_primary_10_1177_09075682251316855
crossref_primary_10_35301_ksme_2017_20_4_445
crossref_primary_10_1080_15265161_2011_613527
crossref_primary_10_1016_j_etiqe_2012_09_003
crossref_primary_10_1371_journal_pone_0200560
crossref_primary_10_20467_1091_5710_24_1_12
crossref_primary_10_1186_s12939_019_1103_2
crossref_primary_10_1177_14777509231182003
crossref_primary_10_7202_1087203ar
crossref_primary_10_1177_15562646211038161
crossref_primary_10_1073_pnas_2322821121
crossref_primary_10_1111_jpm_12407
crossref_primary_10_1186_1741_7015_12_52
crossref_primary_10_1002_hsr2_19
crossref_primary_10_1016_j_socscimed_2025_117751
crossref_primary_10_1007_s00481_024_00818_5
crossref_primary_10_3389_fdgth_2023_1278186
crossref_primary_10_1007_s42048_024_00205_1
crossref_primary_10_1093_jrs_feab100
crossref_primary_10_1111_jep_13830
crossref_primary_10_1007_s11019_019_09932_4
crossref_primary_10_1080_09695958_2018_1543119
crossref_primary_10_1186_s12910_022_00806_8
crossref_primary_10_13060_25706578_2018_19_2_427
crossref_primary_10_1177_1363459320988879
crossref_primary_10_1177_17470161211066159
crossref_primary_10_1007_s40272_015_0158_9
crossref_primary_10_1007_s11019_014_9616_3
crossref_primary_10_1080_15265161_2013_868954
crossref_primary_10_1177_0969733020964850
crossref_primary_10_1177_10778004231163497
crossref_primary_10_1177_14687941231176945
crossref_primary_10_3310_hta25530
crossref_primary_10_1007_s11019_022_10072_5
crossref_primary_10_1177_0969733013518448
crossref_primary_10_1136_bmjgh_2018_001260
crossref_primary_10_1177_15562646211005304
crossref_primary_10_1016_j_canep_2023_102401
crossref_primary_10_1177_17470161241242135
crossref_primary_10_1186_s12961_016_0164_6
crossref_primary_10_1080_15265161_2011_652797
crossref_primary_10_1371_journal_pone_0252101
crossref_primary_10_1007_s11017_013_9258_0
crossref_primary_10_1136_bmjopen_2018_025569
crossref_primary_10_1080_15265161_2014_872392
crossref_primary_10_1136_bmjgh_2021_004937
crossref_primary_10_1136_medethics_2020_106235
crossref_primary_10_1177_0009922820973018
crossref_primary_10_1007_s11673_023_10238_7
ContentType Journal Article
Copyright 2008 The Author
Journal compilation © 2008 Blackwell Publishing Ltd.
Copyright_xml – notice: 2008 The Author
– notice: Journal compilation © 2008 Blackwell Publishing Ltd.
DBID BSCLL
AAYXX
CITATION
CGR
CUY
CVF
ECM
EIF
NPM
7QJ
8BJ
FQK
JBE
K9.
7U1
C1K
7X8
DOI 10.1111/j.1467-8519.2008.00631.x
DatabaseName Istex
CrossRef
Medline
MEDLINE
MEDLINE (Ovid)
MEDLINE
MEDLINE
PubMed
Applied Social Sciences Index & Abstracts (ASSIA)
International Bibliography of the Social Sciences (IBSS)
International Bibliography of the Social Sciences
International Bibliography of the Social Sciences
ProQuest Health & Medical Complete (Alumni)
Risk Abstracts
Environmental Sciences and Pollution Management
MEDLINE - Academic
DatabaseTitle CrossRef
MEDLINE
Medline Complete
MEDLINE with Full Text
PubMed
MEDLINE (Ovid)
International Bibliography of the Social Sciences (IBSS)
ProQuest Health & Medical Complete (Alumni)
Applied Social Sciences Index and Abstracts (ASSIA)
Risk Abstracts
Environmental Sciences and Pollution Management
MEDLINE - Academic
DatabaseTitleList International Bibliography of the Social Sciences (IBSS)
CrossRef
MEDLINE

Risk Abstracts
MEDLINE - Academic
Applied Social Sciences Index and Abstracts (ASSIA)
International Bibliography of the Social Sciences (IBSS)
Database_xml – sequence: 1
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 2
  dbid: EIF
  name: MEDLINE
  url: https://proxy.k.utb.cz/login?url=https://www.webofscience.com/wos/medline/basic-search
  sourceTypes: Index Database
DeliveryMethod fulltext_linktorsrc
Discipline Medicine
Biology
Philosophy
EISSN 1467-8519
EndPage 202
ExternalDocumentID 1459680421
18405317
10_1111_j_1467_8519_2008_00631_x
BIOE631
ark_67375_WNG_CZ250NG0_K
Genre article
Research Support, Non-U.S. Gov't
Journal Article
Feature
GroupedDBID ---
--Z
-ET
.3N
.GA
.GJ
.Y3
04C
05W
0R~
10A
186
1OB
1OC
23N
31~
33P
36B
3O-
4.4
44B
50Y
50Z
51W
51Y
52M
52O
52Q
52R
52S
52T
52U
52V
52W
53G
5GY
5HH
5LA
5VS
66C
6J9
6PF
702
7PT
8-0
8-1
8-3
8-4
8-5
8UM
930
A01
A04
AABCJ
AABNI
AAESR
AAHHS
AAKAS
AAONW
AAOUF
AASGY
AAWTL
AAXRX
AAZKR
ABCQN
ABCUV
ABDBF
ABEML
ABIVO
ABJNI
ABLJU
ABPPZ
ABPVW
ABQWH
ABSOO
ABTAH
ABXGK
ACAHQ
ACBKW
ACBWZ
ACCFJ
ACCZN
ACFBH
ACGFO
ACGFS
ACGOF
ACHQT
ACJZB
ACMXC
ACPOU
ACPRK
ACSCC
ACXQS
ADBBV
ADBTR
ADEMA
ADEOM
ADIZJ
ADKYN
ADMGS
ADMHG
ADOJX
ADXAS
ADZCM
ADZMN
ADZOD
AEEZP
AEGXH
AEIGN
AEIMD
AENEX
AEQDE
AEUQT
AEUYR
AFBPY
AFEBI
AFFNX
AFFPM
AFGKR
AFKFF
AFPWT
AFZJQ
AHBTC
AHEFC
AHMBA
AIACR
AIAGR
AIFKG
AIURR
AIWBW
AJBDE
ALAGY
ALMA_UNASSIGNED_HOLDINGS
ALUQN
AMBMR
AMYDB
ASPBG
ASTYK
AVWKF
AZBYB
AZFZN
AZVAB
BAFTC
BDRZF
BFHJK
BMSDO
BMXJE
BNVMJ
BQESF
BROTX
BRXPI
BSCLL
BY8
CAG
COF
CS3
D-6
D-7
D-C
D-D
DC6
DCZOG
DPXWK
DR2
DRFUL
DRMAN
DRSSH
DU5
EAD
EAP
EAS
EBC
EBD
EBS
ECF
ECT
ECV
EHE
EIHBH
EJD
EMB
EMK
EMOBN
ENC
EPT
ESX
F00
F01
F5P
FEDTE
FUBAC
FZ0
G-S
G.N
G50
GODZA
GXZFM
HGLYW
HVGLF
HZI
HZ~
H~9
IHE
IX1
J0M
KBYEO
LATKE
LC2
LC4
LEEKS
LH4
LITHE
LOXES
LP6
LP7
LUTES
LW6
LYRES
MEWTI
MK4
MRFUL
MRMAN
MRSSH
MSFUL
MSMAN
MSSSH
MVM
MXFUL
MXMAN
MXSSH
N04
N06
N9A
NF~
O66
O9-
OIG
OVD
P2P
P2W
P2Y
P2Z
P4B
P4C
PALCI
PQQKQ
Q.N
Q11
QB0
Q~Q
R.K
RIWAO
RJQFR
ROL
RWL
RX1
RXW
SAMSI
SUPJJ
SV3
TAE
TEORI
TN5
TUS
UB1
UPT
V8K
W8V
W99
WBKPD
WGLLI
WH7
WIH
WII
WIJ
WOHZO
WQ9
WQZ
WRC
WSUWO
WXI
WXSBR
XG1
XJT
XSW
YCJ
YUY
ZGI
ZY4
ZZTAW
~IA
~WP
AAHQN
AAIPD
AAMNL
AANHP
AAYCA
ACRPL
ACUHS
ACYXJ
ADNMO
AFWVQ
AFYRF
ALVPJ
AAYXX
AETEA
AEYWJ
AGHNM
AGQPQ
CITATION
AAMMB
AEFGJ
AGXDD
AIDQK
AIDYY
CGR
CUY
CVF
ECM
EIF
NPM
7QJ
8BJ
FQK
JBE
K9.
7U1
C1K
7X8
ID FETCH-LOGICAL-c5251-225acf4062327d07bd498cdf66052bb49bf24d372465adb3b36aed2d2aec1f23
IEDL.DBID DR2
ISSN 0269-9702
1467-8519
IngestDate Fri Jul 11 16:25:21 EDT 2025
Thu Jul 10 22:13:43 EDT 2025
Fri Jul 11 01:22:23 EDT 2025
Fri Jul 11 11:13:14 EDT 2025
Fri Jul 25 19:32:22 EDT 2025
Mon Jul 21 05:55:09 EDT 2025
Tue Jul 01 01:21:38 EDT 2025
Thu Apr 24 23:09:05 EDT 2025
Wed Jan 22 16:17:52 EST 2025
Wed Oct 30 09:53:23 EDT 2024
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
License http://onlinelibrary.wiley.com/termsAndConditions#vor
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c5251-225acf4062327d07bd498cdf66052bb49bf24d372465adb3b36aed2d2aec1f23
Notes ArticleID:BIOE631
ark:/67375/WNG-CZ250NG0-K
istex:EA04EDCD6D8B0188BA345B1284BEAF04C95B92F6
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-2
content type line 23
ObjectType-Article-1
ObjectType-Feature-2
PMID 18405317
PQID 199550978
PQPubID 32153
PageCount 12
ParticipantIDs proquest_miscellaneous_70499029
proquest_miscellaneous_57306213
proquest_miscellaneous_37046556
proquest_miscellaneous_20711600
proquest_journals_199550978
pubmed_primary_18405317
crossref_primary_10_1111_j_1467_8519_2008_00631_x
crossref_citationtrail_10_1111_j_1467_8519_2008_00631_x
wiley_primary_10_1111_j_1467_8519_2008_00631_x_BIOE631
istex_primary_ark_67375_WNG_CZ250NG0_K
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2008-05
May 2008
2008-05-00
2008-May
20080501
PublicationDateYYYYMMDD 2008-05-01
PublicationDate_xml – month: 05
  year: 2008
  text: 2008-05
PublicationDecade 2000
PublicationPlace Oxford, UK
PublicationPlace_xml – name: Oxford, UK
– name: England
– name: Oxford
PublicationTitle Bioethics
PublicationTitleAlternate Bioethics
PublicationYear 2008
Publisher Blackwell Publishing Ltd
Publisher_xml – name: Blackwell Publishing Ltd
SSID ssj0000955
Score 2.2945714
Snippet ABSTRACT Despite broad agreement that the vulnerable have a claim to special protection, defining vulnerable persons or populations has proved more difficult...
Despite broad agreement that the vulnerable have a claim to special protection, defining vulnerable persons or populations has proved more difficult than we...
SourceID proquest
pubmed
crossref
wiley
istex
SourceType Aggregation Database
Index Database
Enrichment Source
Publisher
StartPage 191
SubjectTerms Adult
Bioethics
Child
clinical ethics
Delivery of Health Care - ethics
Ethics
Ethics Committees, Research - ethics
Ethics Committees, Research - organization & administration
Ethics, Research
Female
Health care
Health Services Accessibility - ethics
Human subjects
Humans
Informed Consent - ethics
Justification
Medical research
Medical sociology
patient selection
Patients
research ethics
Responsibility
Review bodies
Risk
Social Class
Vulnerability
Vulnerable people
Vulnerable Populations
Title VULNERABILITY IN RESEARCH AND HEALTH CARE; DESCRIBING THE ELEPHANT IN THE ROOM?
URI https://api.istex.fr/ark:/67375/WNG-CZ250NG0-K/fulltext.pdf
https://onlinelibrary.wiley.com/doi/abs/10.1111%2Fj.1467-8519.2008.00631.x
https://www.ncbi.nlm.nih.gov/pubmed/18405317
https://www.proquest.com/docview/199550978
https://www.proquest.com/docview/20711600
https://www.proquest.com/docview/37046556
https://www.proquest.com/docview/57306213
https://www.proquest.com/docview/70499029
Volume 22
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9NAEB6hVqBeCoSXKRQfEDdH9trejcUB2YkTGxKnCi4ULivv2r6kSlGTSC2_nh0_AimNVCFutrxja8cz42-8384AvBVZ1iulkIYrbWrgkqORFbYwaA8roQgiRVVKaZLQ6NT5eOaeNfwn3AtT14fY_HBDz6jiNTp4JpZ_O7lCDF5LiaS21UU8idQtxEezPypJeVUDVJVxeIbHbpJ6br3R1pdqH5V-dRsM3Ua11Wdp-BDm7YRqNsq8u16Jrvx5o9bj_5nxIzhs0Kvu1-b2GO4Viw7cr_tZXnfgwaRZqe_AwUnbI-H6CUy_nI6RIRfE4zj9pseJ3q5T6X4y0KPQH6eR3vdn4Xt9EH7uz-IgTkZ6GoV6OA5PIj9JUQjPZ9Pp5MNTSIdh2o-MppODIV0FoAwVNDJZKuyg8BvLTSZyx-vJvKQqmSJCOJ4oiZPbjDjUzXJhC5tmRU5ykhXSKon9DPYWF4viBegFYV7PcUrLFsyR1BSE9UwqWJ6rW0opNGDtS-OyqXKOzTbO-Va2wzhqsenBiVrkVxpYG8kfdaWPO8i8q-xiI5BdzpEpx1z-NRnx_ncFMJORyT9pcNQaDm-CxJLj7ngX99Fo8GZzVXk3Ltlki-JivVQPY5alMOnuETYzsQQe3T3CVUGcEsvePYJh3msST4PntU3_VoDK_1WUZhrQyjLvrBkexNNQHb38V8EjOKipOcgtfQV7q8t18Vrhv5U4hn0_GATD48rDfwFtw0In
linkProvider Wiley-Blackwell
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3db5swED9Nrbb1ZR_ZF-u28jDtjQgM2KA9TCShgZWQKqNrtxcLG3hplU5tIrX76-fjI1u6RqqmvYHwGXHcnX-2z78DeC_y3KukkIYrbWrglqORl7YwqIdMKIJIUVMpTVIaHTmfT9yTthwQnoVp-CFWC27oGXW8RgfHBem_vVxBBr_LiaS21VeAchsLfCOR_mj2B5eUX5dAVXMO3_DZzbSeW3taG6u2Ue1XtwHRdVxbD0z7j-Gs-6QmH-W0v1yIvvx5g-3xP33zE3jUAlg9aCzuKdwr5z2435S0vO7Bg0m7Wd-DncOuTML1M5h-PUowSW4QJ3H2TY9Tvduq0oN0pEdhkGSRPgxm4Ud9FH4ZzuJBnI71LAr1MAkPoyDNUAjvZ9Pp5NNzyPbDbBgZbTEHQ7oKQxkqbuSyUvBBQThWmEwUju_JoqJqPkWEcHxREaewGVH_Li-ELWyalwUpSF5KqyL2C9ian8_LV6CXhPme41SWLZgjqSkI80wqWFGoLqUUGrDur3HZEp1jvY0zvjbhYRy12JbhRC3yKw2sleSPhuzjDjIfasNYCeQXp5gsx1x-nI758LvCmOnY5Aca7HaWw9s4ccnxgLyLR2k02Fs9VQ6Ouzb5vDxfXqqXMctSsHRzC5uZyIJHN7dwVRynxLI3t2A49TWJr8HLxqh_K8BzMFAzDWhtmnfWDB_E01Bdvf5XwT14GGWThCdxerALO02mDqaavoGtxcWyfKvg4EK8q938F4z6RNE
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb5tAEB5ViRrl0of7ImkbDlVvWLDALqiHyg9saGxsuaRNelmxC1wcOVFiS0l_fXd4uHUaS1HVG4idRTvMzH7DzM4AfBBp6hVSSMOVNjUw5GikuS0M6mElFEGkKEspjWManjhfTt3TOv8Jz8JU9SHWP9xQM0p7jQp-mRV_K7lCDH6TEkltq63w5K5DTR_bOPRnf5SS8ssOqMrl8A2f3c3quXemja1qF7l-cx8O3YS15b40eArzZkVVOsq8vVqKtvx5p9jj_1nyM3hSw1e9U8nbc3iUL1rwuGpoeduCvXEdqm_B_rRpknD7AibfTkaYIteNRlFypkex3gSq9E7c18OgM0pCvdeZBZ_0fvC1N4u6UTzUkzDQg1EwDTtxgkR4P5tMxp9fQjIIkl5o1K0cDOkqBGUoq5HKQoEHBeBYZjKROb4ns4Iqb4oI4fiiIE5mM-JQN82ELWya5hnJSJpLqyD2K9hZXCzyN6DnhPme4xSWLZgjqSkI80wqWJapKaUUGrDmo3FZlznHbhvnfMPdYRy5WDfhRC7yGw2sNeVlVerjATQfS7lYE6RXc0yVYy7_Hg9574dCmPHQ5McaHDaCw2srcc3xeLyLB2k0OFo_VeqNMZt0kV-srtXLmGUpULp9hM1MrIFHt49wlRWnxLK3j2Do-JrE1-B1JdO_GeA5aKaZBrSUzAdzhnejSaCuDv6V8Aj2pv0BH0Xx8SHsV2k6mGf6FnaWV6v8ncKCS_G-VPJfVC5DgA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=VULNERABILITY+IN+RESEARCH+AND+HEALTH+CARE%3B+DESCRIBING+THE+ELEPHANT+IN+THE+ROOM%3F&rft.jtitle=Bioethics&rft.au=HURST%2C+SAMIA+A&rft.date=2008-05-01&rft.pub=Blackwell+Publishing+Ltd&rft.issn=0269-9702&rft.eissn=1467-8519&rft.volume=22&rft.issue=4&rft.spage=191&rft_id=info:doi/10.1111%2Fj.1467-8519.2008.00631.x&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=1459680421
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0269-9702&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0269-9702&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0269-9702&client=summon