CITI; Group 2: Social and Behavioral

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

According to the federal regulations, which of the following studies meets the definition of research with human subjects?

A developmental psychologist videotapes interactions between groups of toddlers and their caregivers to determine which intervention methods most effectively manage aggression.

Identify the example of when situation and time are key to assessing risk of harm in a research study:

Asking women if they have had an abortion

According to federal regulations, the expedited review process may be used when the study procedures pose:

No more than minimal risk and the research activities fall within regulatory categories identified as eligible.

What procedures must be described in an agreement called an "assurance of compliance" with a U.S. federal agency?

Procedures in place that ensure that subjects will be protected in a manner commensurate with the Common Rule, including review by an independent committee comparable to an IRB.

According to the federal regulations, research is eligible for exemption, if:

The research falls into one of eight categories of research activity described in the regulations.

Which of the following types of information may schools disclose without consent from the parent or student to a researcher at a local university?

directory information

When required, the information provided to the data subject in a HIPAA disclosure accounting ...

must be more detailed for disclosures that involve fewer than 50 subject records.

A criterion for waiving informed consent is that, when appropriate, subjects are provided additional pertinent information after the study. In which of the following studies would it NOT be appropriate to provide subjects with information about missing elements of consent

A study in which subjects were assigned to study activities based on an undesirable or unflattering physical characteristic as assessed by members of the research team

The researcher's failure to protect research subjects from deductive disclosure is the primary ethical violation in which of the following studies?

"Tastes, Ties, and Time (T3)" study (2006-2009)

A graduate student wants to examine the effect of print media versus televised media on individuals' position on several social issues. The superintendent of a local work release facility, a family friend, will allow the graduate student access to the prison population to help her quickly accrue subjects. The student's IRB should:

Not approve this project because the prisoners are merely a population of convenience for the student.

If disclosure of a subject's involvement in a specific research study can be potentially harmful to the subject, and the consent form is the only record linking the subject to the research, which of the following would be most helpful:

Obtain a waiver of documentation of informed consent.

Which of the following activities constitutes engagement in research?

Obtaining informed consent and conducting research interviews.

According to the federal regulations, human subjects are living individuals about whom an investigator conducting research obtains information through interaction or intervention with the individual, and uses, studies, or analyzes the information; or:

Obtains, uses, studies, analyzes, or generates identifiable PRIVATE information

Which of the following statements about the relationship between an institution and the institution's IRB(s) is correct?

Officials of the institution may overrule an IRB approval.

The Belmont Report's principle of respect for persons incorporates at least two ethical convictions: first, that individuals should be treated as autonomous agents, and second, that:

Persons with diminished autonomy are entitled to protection.

The Belmont principle of beneficence requires that:

Potential benefits justify the risks of harm.

In addition to pregnant women, fetuses, and neonates, another subpart of the HHS regulations provides additional protections for which of the following vulnerable populations?

Prisoners

The purpose of the Family Educational Rights and Privacy Act (FERPA) is to:

Provide parents certain rights over their children's educational records.

As part of the consent process, the federal regulations require researchers to

Provide potential subjects with information at the appropriate reading comprehension level

If the research is subject to Subpart D, which of the following research activities with children would qualify for an exemption under Category 2 (research that includes educational tests, surveys, interviews, observation)?

Research about aptitude testing

In a longitudinal study that will follow children from kindergarten through high school and will collect information about illegal activities, which of the following confidentiality procedures would protect against compelled disclosure of individually identifiable information?

Securing a Certificate of Confidentiality

The specific Department of Health and Human Services (HHS) regulations that apply to research with children are known as:

Subpart D: Additional Protections for Children Involved as Subjects in Research

Which of the following is the least important activity when protecting human subjects in international research?

Assessing transportation conditions

Which of the following is an example of how the principle of beneficence can be applied to a study employing human subjects?

Determining that the study has a maximization of benefits and a minimization of risks.

A researcher proposes to conduct a study at a foreign site. The research has been determined to be exempt from the federal regulations by institutional policy. According to federal regulations, is review required at the foreign site?

If a proposed study qualifies for exemption, federal regulations do not require review at the foreign site where it will be conducted.

Researchers endeavoring to conduct an on-line study should consider that there are some potential risks of harm to subjects unique to internet-based research. One of these risks is:

Individuals may post private identifiable information about themselves on-line without intending it to be public and available to researchers.

Risk of harm in social and behavioral sciences generally fall in three categories, which are:

Invasion of privacy, breach of confidentiality, and study procedures

Under HIPAA, "retrospective research" (a.k.a., data mining) on collections of PHI generally ...

Is research, and so requires either an authorization or meeting one of the criteria for a waiver of authorization.

According to the Belmont Report, the moral requirement that there be fair outcomes in the selection of research subjects, expresses the principle of:

Justice

A researcher calls you stating that he plans to submit a proposal to the NIH for a human subjects research study. He wants to know at what point he and his study team must submit COI disclosures to comply with the PHS regulation.

No later than the time of proposal submission

A general requirement for informed consent is that no informed consent may include any exculpatory language. Exculpatory language is that which waives or appears to waive any of the subject's legal rights or releases or appears to release those conducting the research from liability for negligence. Which of the following statements in a consent form is an example of exculpatory language?

Taking part in the research is voluntary, but if you choose to take part, you waive the right to legal redress for any research-related injuries.

Which federal regulation or law governs how researchers can obtain data about subjects' disciplinary status in school from academic records?

The Family Educational Rights and Privacy Act.

Which of the following studies is linked most directly to the establishment of the National Research Act in 1974 and ultimately to the Belmont Report and federal regulations for human subject protection?

The Public Health Service Study of Untreated Syphilis

A therapist at a free university clinic treats elementary school children with behavior problems who are referred by a social service agency. She is also a doctoral candidate who proposes using data she has and will collect about the children for a case-based research project. Which of the following statements about parental permission is correct?

The parents of the children might feel pressure to give permission to the therapist to use their children's data so that she will continue to provide services to their children.

When a focus group deals with a potentially sensitive topic, which of the following statements about providing confidentiality to focus group participants is correct?

The researcher cannot control what participants repeat about others outside the group.

A HIPAA authorization has which of the following characteristics:

Uses "plain language" that the data subject can understand, similar to the requirement for an informed consent document.

The provisions of Subpart D, of the HHS regulations, Additional Protections for Children Involved as Subjects in Research apply to:

All research funded by HHS

Neither Subpart C (Prisoners) nor Subpart D (Children) applies to juveniles in the correctional systems because wardens of juvenile prisoners (unlike those for adult prisoners) act in loco parentis for juvenile offenders. This statement is false because:

Both subparts apply, as these individuals are under the legal age of consent and are incarcerated

Data are made anonymous by

Destroying all identifiers connected to the data.

An example of an individual financial COI is:

A researcher's spouse holds equity in a publicly traded pharmaceutical company that is also the sponsor of the researcher's study.

According to the federal regulations, which of the following studies meets the definition of research with human subjects?

An experiment is proposed on the relationship between gender-related stereotypes in math and the subsequent performance by males and females on math tests.

An example of an institutional COI is:

An industry sponsor pays for the construction of a new research laboratory at the organization

The internet can be used as a research tool or as the object of a study. Which of the following examples best describes an investigator using the internet as a research tool?

An investigator uses his Facebook wall to post a URL link to a survey he is hosting on SurveyMonkey.

A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use. Direct identifiers will not be collected; however, IP addresses may be present in the data set. Risk of harm should be evaluated by:

Both the magnitude (or severity) and the probability (or likelihood) of harm

Recruiting into research ...

Can qualify as an activity "preparatory to research," at least for the initial contact, but data should not leave the covered entity.

Which of the following constitutes both a breach of confidentiality (the research data have been disclosed, counter to the agreement between researcher and subjects) and a violation of subjects' privacy (the right of the individuals to be protected against intrusion into their personal lives or affairs)?

A faculty member makes identifiable data about sexual behavior available to graduate students, although the subjects were assured that the data would be de-identified.

Which of the following on-line research strategies raises the most concerns regarding the ethical principle of respecting the autonomy of research subjects and the corresponding federal regulations requiring informed consent?

A researcher proposes to join a moderated support group for cancer survivors posing as a survivor. She plans to insert comments to see how the members respond.

According to the federal regulations, which of the following studies meets the definition of research with human subjects?

A study of twenty 4th grade classrooms in which researchers ask the schools to systematically vary the time of day reading is taught, and collect weekly assessments of reading comprehension for each child over a three-month period.

Which of the following examples of using the internet to conduct research meets the federal definition of research with human subjects?

Conducting an on-line focus group with cancer survivors to determine familial support systems. The researcher also invites subjects' significant others to be a part of the focus group.

The COI management plan aims to:

Provide procedures or extras steps to be taken to minimize the risk of bias when a COI is disclosed

HIPAA includes in its definition of "research," activities related to:

Development of generalizable knowledge.

In addition to the general provisions of the Common Rule (the federal regulations for protecting research subjects), the following regulations also govern research in the public schools:

FERPA, PPRA, and Subpart D of the federal regulations

Which of the following statements most accurately describes the requirement for the documentation of minors' assent to participate in research?

Federal regulations do not require the documentation of minors' assent.

A researcher's study uses a dataset of prisoner demographic characteristics. This dataset includes criminal history data that predates incarceration and includes data on disciplinary behavior while in prison. There is no interaction with prisoners. The researcher claims, and the IRB chair agrees, that the study is exempt from IRB review. This decision:

Is wrong because 46.104 states that research conducted in prisons is not exempt if the subject population is only prisoners.

Continuing review of an approved and ongoing study posing more than minimal risk that was initially approved by a convened IRB:

Must occur within 12 months of the approval date.

Additional safeguards that may be included in a social and behavioral study may include:

Remove all direct identifiers from the data as soon as possible.

Which of the following are the three principles discussed in the Belmont Report?

Respect for Persons, Beneficence, Justice

Humphreys collecting data for the Tearoom Trade study under the pretense that he was a lookout is an example of a violation of the principle of:

Respect for persons

A professor at Big State University is writing a biography about Bill Gates and conducting oral histories with all of Bill Gates' friends, family members, and business acquaintances. The researcher submits the research proposal to the institution's IRB. What action can he expect by the IRB?

The IRB will not review this study because it is not research as defined by the federal regulations.

Which of the following methods could be considered a "best practice" in terms of informing respondents how their answers to an on-line survey about personal information will be protected?

The investigator uses the informed consent process to explain how respondent data will be transmitted from the website to his encrypted database without ever recording respondents' IP addresses, but explains that on the internet confidentiality cannot be absolutely guaranteed.

A waiver of the requirement for documentation of informed consent may be granted when

The only record linking the subject and the research is the consent document and the principal risk is a breach of confidentiality

A researcher asks an IRB to waive the requirement for parental permission for a study conducted in schools because the nature of the research requires participation of all the children present in classrooms on the day the research will take place. Assuming that the basic research design could be approved by the IRB and the school, which of the following requirements must be met before an IRB could waive parental permission?

The research must pose no more than minimal risk

One of your subjects is half way through a study of an investigational antidepressant that is injected weekly. The drug requires a taper-down regimen, that is, it should not be stopped abruptly. You learn that the subject will be admitted to prison next week prior to the next scheduled injection. What is the appropriate response for the researcher?

The researcher should contact prison authorities about the medical issue, and report the events to the IRB of record.

The peer review process can create conflicts of interest because the choice of who reviews a potentially publishable project may show:

There may be bias by the peer reviewer as to the area of research

A researcher leaves a research file in her car while she attends a concert and her car is stolen. The file contains charts of aggregated numerical data from a research study with human subjects, but no other documents. The consent form said that no identifying information would be retained, and the researcher adhered to that component. Which of the following statements best characterizes what occurred?

There was neither a violation of privacy nor a breach of confidentiality.

A study that involves interviews of adults is eligible for expedited review. The researcher wants to add an adolescent population (aged 12 to 17) to the study and has designed a parental permission and assent process. No additional changes are planned. Which of the following statements about review of the revised protocol is accurate?

Unless the nature of the questions would raise the level of risk to more than minimal for adolescents, the research would still qualify for expedited review.

A professor at Big State University proposes to study attitudes about obesity in Chile by giving subjects in Chile surveys to complete. Which is a question that the Big State University IRB should ask the researcher in order to determine if this study should be reviewed by a local Chilean IRB or ethics committee, as well as the Big State University IRB?

Will the researchers have collaborators at the research site abroad?

A sociologist wants to study a culture that occurs in some women's prisons: "state families," in which individual prisoners take on certain roles within a group of like-minded prisoners. There is previous evidence that younger prisoners will use older inmates who play the roles of grandparents as a resource before they will turn to staff for help and advice. The lieutenant in charge of a dorm of long-term prisoners offers to gather volunteers to speak to the researcher and also offers to vouch for the integrity of the researcher. The use of this staff is:

Wrong and is prohibited; subject selection needs to be free from intervention by prison authorities or prisoners.


Set pelajaran terkait

ITC 660 Quiz 10 - Networks and Telecommunications

View Set

Social Psych (Aronson) - Chapter 2: Methodology

View Set

Ch 1 Perspectives on maternal newborn and women's health care

View Set

Government and Economics Unit 7 Test: Business and You

View Set

Wikipedias, Songs, and Ram Ranch

View Set

ch. 6 values, ethics, and advocacy

View Set

AP US Government and Politics Types of Democracy Khan Academy

View Set