citi 8

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A HIPAA authorization has which of the following characteristics:

Uses "plain language" that the data subject can understand, similar to the requirement for an informed consent document.

Which of the following is included in the Nuremberg Code:

Voluntary consent

The 1998 FDA regulations for requiring disclosure of significant financial interest reflect which threshold:

Any equity interest in a publicly held company that exceeds $50,000

Identify the example of when situation and time are key to assessing risk of harm in a research study:

Asking women if they have had an abortion

t what point should a Data Manager get involved with the database development?

At study startup

Neither Subpart C (Prisoners) nor Subpart D (Children) applies to juveniles in the correctional systems since Wardens of Juvenile prisoners - unlike those for adult prisoners - act in loco parentis for juvenile offenders. This statement is false because:

Both subparts apply since these individuals are under the legal age of consent and are incarcerated

Which of the following examples of using the Internet to conduct research meets the federal definition of research with human subjects?

Conducting an on-line focus group with cancer survivors to determine familial support systems. The researcher also invites subjects' significant others to be a part of the focus group.

Which of the following brought increased public attention to the problems with the IRB system?

Death of Jesse Gelsinger

Current NIH rules require investigators to disclose details regarding financial conflicts of interest to:

Designated institutional officials

Destroying all identifiers connected to the data.

Destroying all identifiers connected to the data.

Which of the following is an example of how the principle of beneficence can be applied to a study employing human subjects?

Determining that the study has a maximization of benefits and a minimization of risks.

Which of the following types of information may schools disclose without consent from the parent or student to a researcher at a local university? Citizenship. Directory information. Religious affiliation. SAT scores.

Directory information.

A researcher wants to contact former prisoners who are now on parole. She wants to study the difficulty of getting employment based on whether the subjects had been convicted of felony versus misdemeanor crimes. She needs to:

Do nothing in regards the Subpart C since the research does not meet the criteria for prison research: individuals on parole are not considered prisoners. The definition applies to both minors and adults.

Which of the following is an example of how the principle of beneficence is applied to a study involving human subjects?

Ensuring that risks are reasonable in relationship to anticipated benefits.

The National Research Act of 1974

Established the National Commission.

Every member of a study team must define quality the same way in order to produce a high quality database.

False

Which of the following statements most accurately describes the requirement for the documentation of minors' assent to participate in research?

Federal regulations do not require the documentation of minors' assent.

How long is an investigator required to keep consent documents, IRB correspondence, and research records?

For a minimum of three years after completion of the study

According to the HHS 2011 updated of the PHS federal regulations, the threshold amount for reporting a significant financial interest (investigator and his/her spouse and dependents) is:

Greater than $5,000 of ownership in any single public entity/public company.

HIPAA protects a category of information known as protected health information (PHI). PHI includes:

Identifiable health information that is created or held by covered entities and their business associates.

Researchers endeavoring to conduct an on-line study should consider that there are some potential risks of harm to subjects unique to Internet-based research. One of these risks is:

Individuals may post private identifiable information about themselves on-line without intending it to be public and available to researchers.

Risk of harm in social and behavioral sciences generally fall in three categories, which are:

Invasion of privacy, breach of confidentiality, and study procedures

A researcher's study uses a dataset of prisoner demographic characteristics. This dataset includes criminal history data that predates incarceration and includes data on disciplinary behavior while in prison. There is no interaction with prisoners. The researcher claims and the IRB chair agrees that the study is exempt from IRB review. This decision:

Is wrong. 45 CFR 46.101(b) states that research conducted in prisons may not be exempt.

Continuing review of an approved and ongoing protocol

Must occur within 12 months of the approval date.

Continuing review of an approved and ongoing study posing more than minimal risk that was initially approved by a convened IRB:

Must occur within 12 months of the approval date.

The use of prisoners in research is a concern under the Belmont principle of Justice because:

Prisoners may be used to conduct research that only benefits the larger society

In addition to pregnant women, fetuses, and neonates, another subpart of the HHS regulations provides additional protections for which of the following vulnerable populations?

Prisoners.

Which of the following was the result of the Beecher article?

Realization that ethical abuses are not limited to the Nazi regime

A financial conflict of interest could involve:

Receiving stock in a company funding your research.

Additional safeguards that may be included in a social and behavioral study may include:

Remove all direct identifiers from the data as soon as possible.

Which of the following statements about prison research is true?

Researchers may study the effects of privilege upgrades awarded by the prison.

Informed consent is considered an application of which Belmont principle?

Respect for Persons

Which of the following are the three principles discussed in the Belmont Report?

Respect for Persons, Beneficence, Justice

In a longitudinal study that will follow children from kindergarten through high school and will collect information about illegal activities, which of the following confidentiality procedures would protect against compelled disclosure of individually identifiable information?

Securing a Certificate of Confidentiality.

According to federal regulations, which of the following best describes when expedited review of a new, proposed study may be used by the IRB?

The study involves no more than minimal risk and meets one of the allowable categories of expedited review specified in federal regulations

A subject in a clinical research trial experiences a serious, unanticipated adverse drug experience. How should the investigator proceed, with respect to the IRB, after the discovery of the adverse event occurrence?

Report the adverse drug experience in a timely manner, in keeping with the IRB's policies and procedures, using the forms or the mechanism provided by the IRB.

If the research is subject to Subpart D, which of the following research activities with children would qualify for an exemption under Category 2 (research that includes educational tests, surveys, interviews, observation)?

Research about aptitude testing

An investigator obtains consent from subjects to review their medical records and HIV status. He plans to go back to the medical record, so the HIV status information is stored along with patient identifiers in a database that he keeps on his laptop computer. His laptop is stolen. This incident constitutes:

A breach of confidentiality.

Which of the following constitutes both a breach of confidentiality (the research data have been disclosed, counter to the agreement between researcher and subjects) and a violation of subjects' privacy (the right of the individuals to be protected against intrusion into their personal lives or affairs)?

A faculty member makes identifiable data about sexual behavior available to graduate students, although the subjects were assured that the data would be de-identified.

Which of the following on-line research strategies raises the most concerns regarding the ethical principle of respecting the autonomy of research subjects and the corresponding federal regulations requiring informed consent?

A researcher proposes to join a moderated support group for cancer survivors posing as a survivor. She plans to insert comments to see how the members respond.

The provisions of Subpart D, of the HHS regulations, Additional Protections for Children Involved as Subjects in Research apply to:

All research funded by HHS

The Internet can be used as a research tool or as the object of a study. Which of the following examples best describes an investigator using the Internet as a research tool?

An investigator uses his Facebook wall to post a URL link to a survey he is hosting on SurveyMonkey.

If you're unsure about the particulars of HIPAA research requirements at your organization or have questions, you can usually consult with:

An organizational IRB or Privacy Board, privacy officer ("Privacy Officer"), or privacy official ("Privacy Official"), depending on the issue.

A researcher is studying women recently admitted to a state prison. All potential subjects must have children under the age of five. Research subjects will be given a basket of toys to use at their children's first visit that the children can then take home. In assessing this proposal, the IRB needs to determine that the toys are:

Not an excessive incentive.

According to the federal regulations, human subjects are living individuals about whom an investigator conducting research obtains information through interaction or intervention with the individual, and uses, studies, or analyzes the information; or:

Obtains, uses, studies, analyzes, or generates identifiable private information.

IRB continuing review of an approved protocol must:

Occur at least annually.

Which of the following statements about the relationship between an institution and the institution's IRB(s) is correct?

Officials of the institution may overrule an IRB approval.

PPRA gives parents some level of control over their child's: Medical records Educational records Participation in third-party survey research or exposure to instructional materials developed by researchers Ability to opt out of health education (specifically, sexual health education)

Participation in third-party survey research or exposure to instructional materials developed by researchers

According to federal regulations, "children" are defined as:

Persons who have not yet attained the legal age of consent under the applicable laws in the jurisdiction in which the research will be conducted.

A researcher conducting behavioral research collects individually identifiable sensitive information about illicit drug use and other illegal behaviors by surveying college students. The data are stored on a laptop computer without encryption, and the laptop computer is stolen from the researcher's car on the way home from work. This is an unanticipated problem that must be reported because the incident was (a) unexpected (in other words, the researchers did not anticipate the theft); (b) related to participation in the research; and (c) placed the subjects at a greater risk of psychological and social harm from the breach in confidentiality of the study data than was previously known or recognized. According to OHRP, this unanticipated problem must be reported to the IRB in which timeframe?

Promptly

The primary purpose of a Certificate of Confidentiality is to:

Protect identifiable research information from compelled disclosure.

The purpose of the Family Educational Rights and Privacy Act (FERPA) is to: Ensure that surveys do not ask school children to provide sensitive information about their parents. Provide parents certain rights over their children's educational records. Give school principals the right to discuss students' behavioral problems with their parents. Allow school counselors to access students' grades.

Provide parents certain rights over their children's educational records.

The specific Department of Health and Human Services (HHS) regulations that apply to research with children are known as:

Subpart D: Additional Protections for Children Involved as Subjects in Research

Which member of a study team acts as the liaison between a sponsor and site, ensuring that reported data are verifiable to source documentation?

The Clinical Research Associate

Which federal regulation or law governs how researchers can obtain data about subjects' disciplinary status in school from academic records? The No Child Left Behind Act. The Family Educational Rights and Privacy Act. Subpart D of 45 CFR 46. The Protection of Pupil Rights Amendment.

The Family Educational Rights and Privacy Act.

A professor at Big State University is writing a biography about Bill Gates and conducting oral histories with all of Bill Gates' friends, family members, and business acquaintances. The researcher submits the research proposal to the institution's IRB. What action can he expect by the IRB?

The IRB will not review this study because it is not research as defined by the federal regulations.

Which member of a study team is ultimately responsible for the conduct of the study at a site?

The Investigator

Which of the following studies is linked most directly to the establishment of the National Research Act in 1974 and ultimately to the Belmont Report and Federal regulations for human subject protection?

The Public Health Service Tuskegee Study of Untreated Syphilis in the Negro Male.

A conflict of interest implies:

The potential for bias.

According to the federal regulations, research is eligible for exemption, if

The research falls into one of six categories of research activity described in the regulations.

According to Subpart D, research with children may be eligible for exemption under Category 2 when:

The research involves the use of educational tests

According to Subpart D, research with children may be eligible for exemption when:

The research involves the use of educational tests

A researcher asks an IRB to waive the requirement for parental permission for a study conducted in schools because the nature of the research requires participation of all the children present in classrooms on the day the research will take place. Assuming that the basic research design could be approved by the IRB and the school, which of the following requirements must be met before an IRB could waive parental permission?

The research must pose no more than minimal risk.

When a focus group deals with a potentially sensitive topic, which of the following statements about providing confidentiality to focus group participants is correct?

The researcher cannot control what participants repeat about others outside the group.

One of your subjects is half way through a study of an investigational antidepressant that is injected weekly. The drug requires a taper-down regimen, that is, it should NOT be stopped abruptly. You learn that the subject will be admitted to prison next week prior to the next scheduled injection. What is the appropriate response for the researcher?

The researcher should contact prison authorities of the medical issue , and report the events to the IRB of record.

A researcher wants to conduct a secondary analysis using a Centers for Disease Control and Prevention (CDC) database that was collected by the agency solely for surveillance purposes from 1996-2006. The researcher did not participate in the initial collection of the data. The database is publicly available. The database does not include any identifiers. The IRB makes a determination that the individuals whose records will be reviewed do not meet the federal definition of human subjects. Which of the following considerations was relevant to the IRB's determination that this activity does not constitute research with human subjects?

The researcher will not be interacting/intervening with subjects and the data has no identifiers.

A researcher leaves a research file in her car while she attends a concert and her car is stolen. The file contains charts of aggregated numerical data from a research study with human subjects, but no other documents. The consent form said that no identifying information would be retained, and the researcher adhered to that component. Which of the following statements best characterizes what occurred?

There was neither a violation of privacy nor a breach of confidentiality.

A researcher wants to observe preschoolers at a local public playground to evaluate levels of cooperation. The researcher will not interact with the children or record information in such a manner that the identity of the subjects can be readily ascertained. Which of the following statements is true?

This research would be eligible for exemption because the researcher is not interacting with the children and the playground is a public setting.

The HIPAA "minimum necessary" standard applies... Your answer : To all human subjects research that uses PHI.

To all human subjects research that uses PHI without an authorization from the data subject.

Prior to locking a database, a data manager should ensure all data have been entered and all queries are resolved.

True

The 1974 National Research Act

US Public Health Service Policy

A sociologist wants to study a culture that occurs in some women's prisons: "state families," in which individual prisoners take on certain roles within a group of like-minded prisoners. There is previous evidence that younger prisoners will use older inmates who play the roles of grandparents as a resource before they will turn to staff for help and advice. The lieutenant in charge of a dorm of long-term prisoners offers to gather volunteers to speak to the researcher and also offers to vouch for the integrity of the researcher. The use of this staff is:

Wrong and is prohibited; subject selection needs to be free from intervention by prison authorities or prisoners.

The Belmont Report's principle of respect for persons incorporates at least two ethical convictions: first, that individuals should be treated as autonomous agents, and second, that:

persons with diminished autonomy are entitled to protection

The Data Manager should review the study protocol:

to understand primary and secondary endpoints

Typical study conduct activities performed by the data manager include all of the following EXCEPT:

defining edit checks

In order for a quality process to work, study team members must understand all of the following EXCEPT:

how to perform the other team members' jobs

According to the Belmont Report, the moral requirement that there be fair outcomes in the selection of research subjects, expresses the principle of:

justice

When required, the information provided to the data subject in a HIPAA disclosure accounting ...

must be more detailed for disclosures that involve fewer than 50 subject records.

The researcher's failure to protect research subjects from deductive disclosure is the primary ethical violation in which of the following studies?

Harvard "Tastes, Ties, and Time (T3)" study (2006-2009)" study

If you're unsure about the particulars of HIPAA research requirements at your organization or have questions, you can usually consult with:

An organizational IRB or Privacy Board, privacy official ("Privacy Officer"), or security official ("Security Officer"), depending on the issue.

A researcher is examining the quality of life for prisoners who are HIV positive using surveys followed by interview. The IRB must ensure that:

Confidentiality of the prisoners' health status is maintained.

To minimize potential risks of harm, a researcher conducting an on-line survey can:

Design the survey so that no direct or indirect identifiers are collected.

The Belmont principle of beneficence requires that:

Potential benefits justify the risks of harm.

Amendments involving changes to IRB approved protocols do NOT need prior IRB approval if:

The changes must be immediately implemented for the health and well being of the subject.

A study that involves interviews of adults is eligible for expedited review. The researcher wants to add an adolescent population (aged 12 to 17) to the study and has designed a parental permission and assent process. No additional changes are planned. Which of the following statements about review of the revised protocol is accurate?

Unless the nature of the questions would raise the level of risk to more than minimal for adolescents, the research would still qualify for expedited review.

When designing a database and data collection instruments for a study, the Data Manager should:

Use standards to reduce the time required to set up the database and to increase the consistency of the data

If the research is subject to Subpart D, which of the following research activities with children would qualify for an exemption under Category 2 (research that includes educational tests, surveys, interviews, observation)? Observation of public behavior when the researcher participates in the activities being observed Survey procedures Research about aptitude testing Interviews

Research about aptitude testing

Humphreys collecting data for the Tearoom Trade study under the pretense that he was a lookout is an example of a violation of the principle of:

Respect for persons.

What statement about risks in social and behavioral sciences research is most accurate:

Risks are specific to time, situation, and culture.

As part of a research study, a physician plans to review medical records of the next 50 of her patients who require magnetic resonance imaging (MRI) scans for clinical treatment to explore factors related to patients requiring MRI scans. The physician will review the medical records, and write down the clinical indication for the scans, any existing injuries, current prescriptions, as well as other clinical data. The clinical indication for the scans and the other clinical data will be collected in the medical records for treatment purposes as part of standard clinical care. The physician will use a coding system to be able to identify the patient's information; however, the "key" to the coding system will be stored separately from the data in a locked cabinet that only she will have access to. Which of the following is true?

The study is human subject research which is eligible for expedited review.


Kaugnay na mga set ng pag-aaral

Interpersonal Communications Exam 3

View Set

생활 스페인어 중간 (문장)

View Set

Immuno exam - 1,2,3,4,5 (allt saman)

View Set

PHSC : Information Literacy Quiz

View Set

Important days, date, and numbers

View Set

Milestone 1, Chapter 5: Carbohydrates

View Set

second finance midterm conceptual questions

View Set

Human Physiology Practice Questions

View Set