Risk of harm in social and behavioral sciences generally fall in three categories, which are:
A. Breach of confidentiality, loss of autonomy, and study procedures.
B. Invasion of privacy, adverse reaction to study drug, and discrimination.
C. Invasion of privacy, breach of confidentiality, and study procedures.
D. Study procedures, breach of confidentiality, and loss of employment.
The Correct Answer for the given question is option C. Invasion of privacy, breach of confidentiality, and study procedures.
Similarly,
According to subpart d, research with children may be eligible for exemption under category 2 when:
a. The research involves the use of educational tests
b. The children will be interviewed by the researcher.
c. The research with children will involve participant observation with researcher interaction.
d. The children will be asked to complete a survey.
The Correct Answer for the given question is option c. The research with children will involve participant observation with researcher interaction.
Which is an example of a situation where deferential vulnerability might be a factor?
A. A college professor recruiting among his students
B. An army medical officer recruiting subjects among lower ranks
C. A physician recruiting his patients
D. An employer recruiting among persons who directly report to him
The Correct Answer for the given question is option C. A physician recruiting his patients
Which of the following is most likely to own the data resulting from a research project?
a. Local drive
b. Cloud storage
c. ODS (Operational Data Store)/ Data warehouse
d. External Storage Device
The Correct Answer for the given question is option c. ODS (Operational Data Store)/ Data warehouse
Which of the following is true regarding research misconduct?
A. Federal funding agencies typically rely on an institution to make the initial response to an allegation of research misconduct.
B. The U.S. government is required to reveal publicly the identity of any person who commits misconduct.
C. Funding agencies normally perform their own misconduct inquiry before the institution becomes involved.
D. A central federal agency handles all cases of research misconduct.
The Correct Answer for the given question is option A. Federal funding agencies typically rely on an institution to make the initial response to an allegation of research misconduct.
Which is true of inducements in research?
A. Like coercion undue inducement is easy for IRBs to determine.
B. Offering $10 for an hour long research study constitutes undue inducement.
C. Inducements like coercion are always inappropriate as they violate the ethical principle of respect for persons.
D. Inducements constitute an “undue influence” if they alter a potential subject’s decision-making processes such that they do not appropriately weigh the risk-benefit relationship of the research.
The Correct Answer for the given question is option D. Inducements constitute an “undue influence” if they alter a potential subject’s decision-making processes such that they do not appropriately weigh the risk-benefit relationship of the research.
What is the main function of a technology transfer office with respect to collaborative research?
a. it arranges the purchase and delivery of new computer hardware for research teams.
b. it arranges movers to pack and ship equipment to a researcher’s new facilities.
c. it sets up new e-mail accounts.
d. it collaborative researchers to commercialize their work.
The Correct Answer for the given question is option d. it collaborative researchers to commercialize their work.
- As part of the consent process, the federal regulations require researchers to: - September 8, 2024
- Concept and Nature of Intellectual Property Rights – Explained in Detail | Business Law - January 30, 2024
- Management Information Systems Online Degree – Courses, Colleges, and Careers in MIS - January 16, 2024