Research Methods in Psychology Chapter 3 Smartbook

Ace your homework & exams now with Quizwiz!

_____ presents a fraud scenario and then allows the user to go back and assume the roles of various people in the scenario to explore how the deception could have been avoided.

"The Lab"

In the process of informed consent, the participant reads and signs a form specifying _____.

-the requirements for participation -the purpose of a study -the costs and benefits of research participation -the methods to be used

Which of the following activities are likely to constitute research fraud

Attaching one's name to research that one had little to do with Claiming credit for work done by others Using another person's work or ideas without proper acknowledgment

Identify the basic principles of ethical treatment of human participants underlying all medical and behavioral research presented by the Belmont Report.

Respect for Persons Beneficence Justice

_____ was issued to clarify the information used by members of the National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research.

The Belmont Report

To educate scientists about research fraud, the U.S. Office of Research Integrity has a simulation exercise called " __ __ ".

The Lab

According to David Pettinger, which form of Internet research does not fall under the heading of research that requires informed consent

The exchange of information in open, public Internet forums

Identify three general methods science has for guarding against research fraud.

The peer-review process for publication The grant-review process Replication of results

According to Jane Steinberg, a strategy for research fraud is to _____.

contact research participants after they have participated in a study to see if they actually participated

According to Section C of the ethical code of the APA, psychologists seek to promote _____ in the science, teaching, and practice of psychology.

honesty truthfulness accuracy

According to Douglas (2018), ill-gotten information from Internet research is defined as research data collected by

ignoring the rights of human subjects to refuse to participate or to remove themselves and their data from the dataset.

According to your text, the ideas that already obtained research data should not be used because they are morally tainted, that using the data justifies evil, and that not using the data deters others from using morally repugnant methods are all arguments against using

ill-gotten information.

In the context of ethical research guidelines, David Pittenger suggests that one should study several Internet groups devoted to the same topic or issue to

increase the generality of the results of a study

A pocess that involves informing a participant about research and obtaining consent to participate in it is known as __.

informed consent

A process that involves informing a participant about research and obtaining consent to participate in it is known as _____.

informed consent

David Pittenger pointed out that the Internet poses a serious threat to the privacy of Internet research participants. One of the two concerns raised by him is over the ethical responsibilities of researchers who

insinuate themselves into online groups without identifying themselves as researchers

After successfully completing a training course on ethical treatment of research participants, a researcher needs to submit a research proposal to a(n) __ __ __for review.

institutional review board

According to Broad and Wade (1983), using the _____, which is followed when a researcher breaks his or her research into a number of smaller studies to obtain the maximum number of publications from a single, larger study, might be considered dishonest.

least-publishable-unit rule

At the time of adoption, the Declaration of Helsinki specifically addressed _____.

medical research

According to the U.S. Department of Health and Human Services, if a child is not old enough to give assent for research participation, a researcher _____.

must obtain permission from one or both parents

According to behaviorism, the subject matter of psychology was _____.

observable responses observable stimuli

According to Broad & Wade, the most harmful, but rare, form of research fraud is the

outright fabrication of data

A true statement about the online research environment is that it _____.

poses challenges concerning anonymity of participants and confidentiality of their responses

In the context of the basic principles presented by the Belmont Report, an accurate statement about the principle of justice is that it _____.

prohibits using participant populations simply because they are readily available

A researcher is ethically bound to

protect the confidentiality of participants' response

When a researcher uses deception in an online research, he or she must

protect the dignity of research participants debrief his or her participants dehoax his or her participants

According to the beneficence principle of the Belmont Report, ethical research practice includes a requirement to _____.

protect the well-being of research participants

At the RCR exposition, various vendors can showcase their programs and products designed to

reduce research fraud

At the RCR exposition, various vendors can showcase their programs and products designed to _____.

reduce research fraud

According to Steinberg, students should learn the implications of research fraud for

researchers themselves

Both an institutional review board and a researcher must assess the _____ of doing research.

risk-benefit ratio

An institutional review board is important because it allows a group of individuals who do not have a vested interest in a research to _____.

screen the study

According to the respect for persons principle of the Belmont Report, research participants _____.

should enter into participation voluntarily

The review and approval from an institutional review board provides protection for the _____.

sponsoring institution researcher participants

An RCR exposition is an education effort by _____ to educate scientists about research fraud.

the ORI

The APA's Ethical Principles of Psychologists and Code of Conduct 2002 is a comprehensive document specifying _____.

the ethical responsibilities of psychologists and researchers

The first concern raised by David Pittenger for the Internet posing a threat to the privacy of Internet research participants refers to

the protections that are available in the software programs used by researchers

According to David Pittenger, _____ poses a serious threat to the privacy of Internet research participants.

the public nature of the Internet

According to the 2002 APA ethical principles that apply to human research participants, informed consent shall be obtained when voices or images are recorded as data unless Multiple Choice

the research design includes deception and consent for the use of the recording is obtained during debriefing.

According to the Declaration of Helsinki, a research must be reviewed by an independent group of individuals to ensure that __.

the research protocol adheres to accepted ethical standards.

The Nuremberg Code includes _____.

the stipulation that participation in research should be voluntary

The Nuremberg Code includes __.

the stipulation that participation in research should be voluntary.

One way to deal with research fraud is to

train students in the ethics of the research process

According to David Pittenger, a person can easily maintain anonymity on the Internet by

using a pseudonym

In the context of ethical research on Internet, David Pittenger suggests that one can add a layer of protection to participants' privacy by

using multiple Internet groups

A researcher can protect the confidentiality of participants' responses by _____.

using proper software applications using appropriate hardware storing data on a portable storage device

A researcher may need to add more sections to the informed-consent form if research participants _____.

will incur any expenses will be paid may sustain injury

According to Keller and Lee, maintaining anonymity in Internet research may be especially problematic if a participant uses a _____ to respond.

work e-mail account

Confidentiality

Ensuring the security of one's participants' responses

Identify the items of information required by an institutional review board (IRB) to evaluate a research proposal.

Experimental procedures to be used How participants will be acquired Procedures for obtaining informed consent

Debriefing

Explaining the methods used in a study, including any deception

"Ghost" e-mail account

Hides one's actual e-mail address

Identify the categories of research fraud defined by the U.S. Office of Research Integrity.

Data fabrication Falsification Plagiarism

What should be done in case of animal subjects in order to restrain research fraud?

Animal use records should be scrutinized after a study.

Plagiarism

Appropriation of another person's ideas, processes, or results without giving appropriate credit

Anonymity

Assuring one's participants that they cannot be identified as participants in one's study

E-mail stripping software

Choice, Removes identifying information from the e-mails Removes identifying information from the e-mails

Dehoaxing

Convincing participants that the deception is necessary and taking steps to reverse any ill effects of being deceived

What must a researcher and an institutional review board determine before approving a research

If the benefits of the research outweigh the potential risks to participants

According to the U.S. Department of Health and Human Services, in which of the following situations is it mandatory for a researcher to obtain permission from both parents when a child is used as a research subject?

If there is greater than minimal risk involved in the research If there is no direct benefit to the child participant

Identify a function of the U.S. Office of Research Integrity within the U.S. Department of Health and Human Services.

It oversees the integrity of the research process.

The founder of the behaviorist school of psychology was __ __

John Watson

Identify a basic principle presented by the Belmont Report that states that both the researcher and the participant should share the costs and potential benefits of a research study.

Justice

Falsification

Manipulating research materials, equipment, or processes

The groundwork for many of the current ethical standards for psychological and medical research was laid by the __ __.

Nuremberg Code

Identify an accurate statement about using Internet media to conduct a research study.

One must be careful when studying material posted on a social media site.

Identify David Pittenger's suggestion for ethical research on Internet groups.

One should learn about and respect the rules of the Internet group under study.

What should one do to guarantee participants' anonymity if one is using their personal e-mail addresses to contact them?

One should set up temporary "ghost" e-mail accounts. One should use e-mail stripping software.

Identify a true statement about research fraud.

People do not report the detected fraud.

Identify the guidelines to protect Internet research participants' identities as suggested by David Pittenger.

Remove participants' pseudonyms from the data. Eliminate participants' names from the data.

Which of the following issues are included in the educational experiences under the Responsible Conduct of Research (RCR) program?

Research misconduct Responsible authorship

Identify a component of respect for persons, a principle presented in the Belmont Report.

Research participants must be treated as autonomous persons who are capable of making their own decisions.

Identify the components of the beneficence principle of the Belmont Report.

Researchers should not harm participants. Researchers should maximize benefits while minimizing harm.

Fraud may go unreported because the liabilities associated with "blowing the whistle" can be quite severe. Identify the consequences whistle-blowers may have to face in case of research fraud.

They may be vilified. Their credibility is called into question. They may be fired for doing the right thing.

Identify a principle, suggested by Susan Fiske, that institutional review boards must adhere to for smooth functioning.

They must act to protect human research participants against harm and unethical treatment.

True or false: One needs informed consent before studying information posted on a public access social media site like Facebook.

This is false. Information posted on a public access Facebook page can be studied without informed consent. However, one must be careful when studying material posted on a social media site like Facebook.

True or false: In order to treat science ethically, psychologists can misrepresent facts intentionally.

This is false. Psychologists should not steal, cheat, or engage in fraud, subterfuge, or misrepresent facts intentionally in order to treat science ethically and with integrity.

True or false: In 1973, the APA established a set of ethical guidelines for using animals in research.

This is false. The APA (1973) established a set of ethical guidelines for research in which children are used as participants.

True or false: Replication of experiments is expensive and a time-consuming method for guarding against research fraud.

This is true. Replication of experiments is expensive and time consuming and unlikely to occur across labs. Even if a finding cannot be replicated, which does not necessarily mean fraud has occurred.

True or false: The best guard against fraud in science is to imbue researchers during the training process with the idea that ethical research means being honest.

This is true. The best guard against fraud in science is to imbue researchers during the training process with the idea that ethical research means being honest. This process should begin as early as possible.

True or false: The Office of Research Integrity (2013) suggests that whistleblowers are a crucial component in the fight against misconduct in science.

This is true. When misconduct does occur, scientists should be encouraged to blow the whistle when they have strong proof that misconduct took place. The Office of Research Integrity (2013) suggests that whistleblowers are a crucial component in the fight against misconduct in science.

Current regulations in the United States require that certain categories of e-mails be archived and made part of the national record. This compromises anonymity as anyone may be able to gain access to any e-mails related to one's research. Hence, one should suggest participants to

avoid using work e-mail accounts when responding

Depending on the nature of one's research, one may be required to submit _____ to the institutional review board.

a draft of an informed-consent form

According to Susan Fiske, institutional review boards can serve to promote research by

adequately training their staff and researchers concerning their function

According to David Pittenger, a true statement about researchers who study online groups without identifying themselves as researchers is that they should _____.

be mindful of the nature of online groups

With respect to research fraud, if a scientist replaces actual data with false data, he is involved in

data fabrication

A true statement about the U.S. Office of Research Integrity is that it

documents and investigates cases of research fraud in science

David Pittenger offers three arguments for considering the Internet equivalent to a public place. One of his arguments is that Internet use is now so common that users should understand that it

does not afford privacy

Submitting research to an institutional review board (IRB) for review involves

drafting a proposal

The Responsible Conduct of Research (RCR) program is designed by the U.S. Office of Research Integrity to

educate scientists about research fraud

The Responsible Conduct of Research (RCR) program is designed by the U.S. Office of Research Integrity to _____.

educate scientists about research fraud

The role of an institutional review board (IRB) is to

ensure that researchers adhere to established ethical guidelines

In the context of ethical considerations, a researcher's proposal is reviewed to __.

ensure that the safety, well-being, dignity, and rights of participants are protected.

Before conducting a research, a researcher must present his or her research protocol for review of

ethical issues

Early in their academic careers, students should be taught that

ethical research practice requires scientific integrity

Before making an allegation of research fraud, whistle-blowers should _____.

find out what to include in a report familiarize him- or herself with the policies of the institution find out to whom the report should be given


Related study sets

Problems with the Articles of Confederation-1/15

View Set

Computer Info Systems: Chapter 10 Study Sheet

View Set

need to get a good grade on this final... i missed two assignments

View Set

Early Republic and Federalist Control

View Set

FILING INFORMATION/TAX WITHOLDING AND ESTIMATED TAX

View Set

1601 Quiz 11 Information Security Fundamentals

View Set

Chapter 6 Intro to Research Methods

View Set

Ch.12 physics test practice questions

View Set

Test 3 (Chapters 16.3-16.6 & 17) Deadline 4/13/18 by 5:00 pm

View Set