CITI Certification

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The Belmont Report's principle of respect for persons incorporates at least two ethical convictions: first, that individuals should be treated as autonomous agents, and second, that:

Persons with diminished autonomy are entitled to protection.

Risk of harm in social and behavioral sciences generally fall in three categories, which are:

invasion of privacy, breach of confidentiality, and study procedures

A criterion for waiving informed consent is that, when appropriate, subjects are provided additional pertinent information after the study. In which of the following studies would it NOT be appropriate to provide subjects with information about missing elements of consent:

A study in which subjects were assigned to study activities based on an undesirable or unflattering physical characteristic as assessed by members of the research team.

The researcher's failure to protect research subjects from deductive disclosure is the primary ethical violation in which of the following studies?

"Tastes, Ties, and Time (T3)" study (2006-2009)

According to the federal regulations, which of the following studies meets the definition of research with human subjects?

A cognitive psychologist enrolls undergraduate students for a computer-based study about the effect of mood on problem-solving behaviors.

Which of the following statements about the relationship between an institution and the institution's IRB(s) is correct?

Officials of the institution may overrule an IRB approval.

According to the authors, there are four common abuses that historically are described as giving rise to vulnerability. Which response below contains the correct four?

Physical control, coercion, undue influence, and manipulation

The Belmont principle of beneficence requires that:

Potential benefits justify the risks of harm.

In a longitudinal study that will follow children from kindergarten through high school and will collect information about illegal activities, which of the following confidentiality procedures would protect against compelled disclosure of individually identifiable information?

Securing a Certificate of Confidentiality

When an IRB is reviewing a research study and they are considering if a potential subject population is vulnerable, they should consider:

Is there a power differential between researchers and subjects?

According to the federal regulations, research is eligible for exemption, if:

No more than minimal risk and the research activities fall within regulatory categories identified as eligible

In order to grant a waiver or alteration of the requirements of informed consent, an IRB must find which of the following:

The research could not practicably be carried out without the waiver of consent.

According to the federal regulations, research is eligible for exemption, if:

The research falls into one of eight categories of research activity described in the regulations.

According to the federal regulations, which of the following studies meets the definition of research with human subjects?

An experiment is proposed on the relationship between gender-related stereotypes in math and the subsequent performance by males and females on math tests.

The procedures for reporting potential unanticipated problems involving risk to subjects or others to the IRB are:

Determined by the institution in its written policies and procedures

The NBAC looks at characteristics individuals might have that would prevent them from being able to provide voluntary informed consent. The traits may be thought of as falling into six broad areas: cognitive or communicative, institutional, deferential, medical, economic, and social. Prospective research subjects who are not able to comprehend information, deliberate, and make decisions about participation in a proposed research study have a:

Cognitive or communicative vulnerability

Which of the following is an example of how the principle of beneficence can be applied to a study employing human subjects?

Determining that the study has a maximization of benefits and a minimization of risks.

Data are made anonymous by

Destroying all identifiers connected to the data.

A general requirement for informed consent is that no informed consent may include any exculpatory language. Exculpatory language is that which waives or appears to waive any of the subject's legal rights or releases or appears to release those conducting the research from liability for negligence. Which of the following statements in a consent form is an example of exculpatory language?

Taking part in the research is voluntary, but if you choose to take part, you waive the right to legal redress for any research-related injuries.

A researcher leaves a research file in her car while she attends a concert and her car is stolen. The file contains charts of aggregated numerical data from a research study with human subjects, but no other documents. The consent form said that no identifying information would be retained, and the researcher adhered to that component. Which of the following statements best characterizes what occurred?

There was neither a violation of privacy nor a breach of confidentiality.

According to OHRP, a problem is an "unanticipated problem" when it meets which of the following criteria:

Unexpected, related or possible related to the research, suggests the research puts subjects or others at greater risk

Which of the following constitutes both a breach of confidentiality (the research data have been disclosed, counter to the agreement between researcher and subjects) and a violation of subjects' privacy (the right of the individuals to be protected against intrusion into their personal lives or affairs)?

A faculty member makes identifiable data about sexual behavior available to graduate students, although the subjects were assured that the data would be de-identified.

Which is an example of a situation where deferential vulnerability might be a factor?

A physician recruiting patients to be subjects

An example of an individual financial COI is:

A researcher's spouse holds equity in a publicly traded pharmaceutical company that is also the sponsor of the researcher's study.

Which of the following is an example of how the principle of beneficence is applied to a study involving human subjects?

Ensuring that risks are reasonable in relationship to anticipated benefits

A researcher wishes to study generational differences in coping mechanisms among adults who experienced abuse as children. Adequate measures will be instituted to obtain informed consent and ensure that there is no breach of confidentiality. The most likely additional risk is that some subjects may:

Experience emotional or psychological distress.

A researcher's membership on an advisory board with an organization sponsoring research can create a COI because:

It may be difficult for the researcher to appear neutral, as the researcher may have an interest in the research's success

Subjects with a serious illness may be at risk for exploitation because they may be desperate for a possible cure. This is an example of:

Medical vulnerability

Continuing review of an approved and ongoing study posing more than minimal risk that was initially approved by a convened IRB:

Must occur within 12 months of the approval date.

A researcher calls you stating that he plans to submit a proposal to the NIH for a human subjects research study. He wants to know at what point he and his study team must submit COI disclosures to comply with the PHS regulation.

No later than the time of proposal submission

A researcher conducts a focus group to learn about attitudes towards hygiene and disease prevention. Two weeks after the focus group, the researcher learns one of the subjects had a heart attack at home and was hospitalized, but made a full recovery. Based on HHS regulations, should the researcher report this event to the IRB?

No, this does not need to be reported because it is unrelated to participation in the study.

A researcher conducting behavioral research collects individually identifiable sensitive information about illicit drug use and other illegal behaviors by surveying college students. One of the subjects is in an automobile accident two weeks after participating in the research study. Is this an example of an unanticipated problem that requires reporting to the IRB?

No, this does not need to be reported because it was assessed by the researcher as unrelated to the research study.

The COI management plan aims to:

Provide procedures or extras steps to be taken to minimize the risk of bias when a COI is disclosed

The primary purpose of a Certificate of Confidentiality is to:

Protect identifiable research information from compelled disclosure.

As part of the consent process, the federal regulations require researchers to:

Provide potential subjects with information at the appropriate reading comprehension level.

Additional safeguards that may be included in a social and behavioral study may include:

Remove all direct identifiers from the data as soon as possible.

Which of the following are the three principles discussed in the Belmont Report?

Respect for Persons, Beneficence, Justice

Humphreys collecting data for the Tearoom Trade study under the pretense that he was a lookout is an example of a violation of the principle of:

Respect for persons

A professor at Big State University is writing a biography about Bill Gates and conducting oral histories with all of Bill Gates' friends, family members, and business acquaintances. The researcher submits the research proposal to the institution's IRB. What action can he expect by the IRB?

The IRB will not review this study because it is not research as defined by the federal regulations.

Which of the following studies is linked most directly to the establishment of the National Research Act in 1974 and ultimately to the Belmont Report and federal regulations for human subject protection?

The Public Health Service Study of Untreated Syphilis

A waiver of the requirement for documentation of informed consent may be granted when:

The only record linking the subject and the research is the consent document and the principal risk is a breach of confidentiality.

A therapist at a free university clinic treats elementary school children with behavior problems who are referred by a social service agency. She is also a doctoral candidate who proposes using data she has and will collect about the children for a case-based research project. Which of the following statements about parental permission is correct?

The parents of the children might feel pressure to give permission to the therapist to use their children's data so that she will continue to provide services to their children.

When a focus group deals with a potentially sensitive topic, which of the following statements about providing confidentiality to focus group participants is correct?

The researcher cannot control what participants repeat about others outside the group.

A researcher wants to conduct a secondary analysis using a Centers for Disease Control and Prevention (CDC) database that was collected by the agency solely for surveillance purposes from 1996-2006. The researcher did not participate in the initial collection of the data. The database is publicly available. The database does not include any identifiers. The IRB makes a determination that the individuals whose records will be reviewed do not meet the federal definition of human subjects. Which of the following considerations was relevant to the IRB's determination that this activity does not constitute research with human subjects?

The researcher will not be interacting/intervening with subjects and the data has no identifiers.

The peer review process can create conflicts of interest because the choice of who reviews a potentially publishable project may show:

There may be bias by the peer reviewer as to the area of research

An investigator obtains consent and HIPAA authorization from subjects to review their medical records and HIV status. He plans to go back to the medical record, so the HIV status information is stored along with subject identifiers in a database that he keeps on his laptop computer. His laptop is stolen. This incident constitutes:

a breach of confidentiallity

Researcher access to confidential records adds to the vulnerability of workers who participate in workplace studies. Inappropriate release of identifiable private information could adversely affect a worker's retention of a job, insurance, or other employment related benefits. To avoid or minimize these risks, the study design must include adequate safeguards to protect the confidentiality of the information collected. A plan for the proper management of study data and records should clearly define:

all of the above

When workers are asked to participate in a research study, vulnerabilities related to the subject's employment may include:

all of the above

Identify the example of when situation and time are key to assessing risk of harm in a research study:

asking women if they have had an abortion

In addition to pregnant women, fetuses, and neonates, another subpart of the HHS regulations provides additional protections for which of the following vulnerable populations?

prisoners

A medical record is an example of:

private information

A researcher conducting behavioral research collects individually identifiable sensitive information about illicit drug use and other illegal behaviors by surveying college students. The data are stored on a laptop computer without encryption, and the laptop computer is stolen from the researcher's car on the way home from work. This is an unanticipated problem that must be reported because the incident was (a) unexpected (in other words, the researchers did not anticipate the theft); (b) related to participation in the research; and (c) placed the subjects at a greater risk of psychological and social harm from the breach in confidentiality of the study data than was previously known or recognized. According to OHRP, this unanticipated problem must be reported to the IRB in which timeframe?

promptly

Census data (the final report as published by the Census Bureau) is an example of:

public information

When a research project includes the collection of biological samples, all planned future uses of the samples, identifiers, and the data obtained from the samples, must be fully explained to the research subject.

true

Vulnerable persons are those who are less able to protect themselves than other persons in a given situation. The Common Rule (45 CFR 46, Subpart A) has specific requirements for the following vulnerable populations, except:

workers


संबंधित स्टडी सेट्स

Chapter 8: Common Health Problems of the Newborn

View Set

Unit 7.3 Economic Indicators (Series 65)

View Set

OB - Chapter 23: Nursing Care of the Newborn With Special Needs

View Set