Research Methods in Psychology Chapter 3 Smartbook
_____ presents a fraud scenario and then allows the user to go back and assume the roles of various people in the scenario to explore how the deception could have been avoided.
"The Lab"
In the process of informed consent, the participant reads and signs a form specifying _____.
-the requirements for participation -the purpose of a study -the costs and benefits of research participation -the methods to be used
Which of the following activities are likely to constitute research fraud
Attaching one's name to research that one had little to do with Claiming credit for work done by others Using another person's work or ideas without proper acknowledgment
Identify the basic principles of ethical treatment of human participants underlying all medical and behavioral research presented by the Belmont Report.
Respect for Persons Beneficence Justice
_____ was issued to clarify the information used by members of the National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research.
The Belmont Report
To educate scientists about research fraud, the U.S. Office of Research Integrity has a simulation exercise called " __ __ ".
The Lab
According to David Pettinger, which form of Internet research does not fall under the heading of research that requires informed consent
The exchange of information in open, public Internet forums
Identify three general methods science has for guarding against research fraud.
The peer-review process for publication The grant-review process Replication of results
According to Jane Steinberg, a strategy for research fraud is to _____.
contact research participants after they have participated in a study to see if they actually participated
According to Section C of the ethical code of the APA, psychologists seek to promote _____ in the science, teaching, and practice of psychology.
honesty truthfulness accuracy
According to Douglas (2018), ill-gotten information from Internet research is defined as research data collected by
ignoring the rights of human subjects to refuse to participate or to remove themselves and their data from the dataset.
According to your text, the ideas that already obtained research data should not be used because they are morally tainted, that using the data justifies evil, and that not using the data deters others from using morally repugnant methods are all arguments against using
ill-gotten information.
In the context of ethical research guidelines, David Pittenger suggests that one should study several Internet groups devoted to the same topic or issue to
increase the generality of the results of a study
A pocess that involves informing a participant about research and obtaining consent to participate in it is known as __.
informed consent
A process that involves informing a participant about research and obtaining consent to participate in it is known as _____.
informed consent
David Pittenger pointed out that the Internet poses a serious threat to the privacy of Internet research participants. One of the two concerns raised by him is over the ethical responsibilities of researchers who
insinuate themselves into online groups without identifying themselves as researchers
After successfully completing a training course on ethical treatment of research participants, a researcher needs to submit a research proposal to a(n) __ __ __for review.
institutional review board
According to Broad and Wade (1983), using the _____, which is followed when a researcher breaks his or her research into a number of smaller studies to obtain the maximum number of publications from a single, larger study, might be considered dishonest.
least-publishable-unit rule
At the time of adoption, the Declaration of Helsinki specifically addressed _____.
medical research
According to the U.S. Department of Health and Human Services, if a child is not old enough to give assent for research participation, a researcher _____.
must obtain permission from one or both parents
According to behaviorism, the subject matter of psychology was _____.
observable responses observable stimuli
According to Broad & Wade, the most harmful, but rare, form of research fraud is the
outright fabrication of data
A true statement about the online research environment is that it _____.
poses challenges concerning anonymity of participants and confidentiality of their responses
In the context of the basic principles presented by the Belmont Report, an accurate statement about the principle of justice is that it _____.
prohibits using participant populations simply because they are readily available
A researcher is ethically bound to
protect the confidentiality of participants' response
When a researcher uses deception in an online research, he or she must
protect the dignity of research participants debrief his or her participants dehoax his or her participants
According to the beneficence principle of the Belmont Report, ethical research practice includes a requirement to _____.
protect the well-being of research participants
At the RCR exposition, various vendors can showcase their programs and products designed to
reduce research fraud
At the RCR exposition, various vendors can showcase their programs and products designed to _____.
reduce research fraud
According to Steinberg, students should learn the implications of research fraud for
researchers themselves
Both an institutional review board and a researcher must assess the _____ of doing research.
risk-benefit ratio
An institutional review board is important because it allows a group of individuals who do not have a vested interest in a research to _____.
screen the study
According to the respect for persons principle of the Belmont Report, research participants _____.
should enter into participation voluntarily
The review and approval from an institutional review board provides protection for the _____.
sponsoring institution researcher participants
An RCR exposition is an education effort by _____ to educate scientists about research fraud.
the ORI
The APA's Ethical Principles of Psychologists and Code of Conduct 2002 is a comprehensive document specifying _____.
the ethical responsibilities of psychologists and researchers
The first concern raised by David Pittenger for the Internet posing a threat to the privacy of Internet research participants refers to
the protections that are available in the software programs used by researchers
According to David Pittenger, _____ poses a serious threat to the privacy of Internet research participants.
the public nature of the Internet
According to the 2002 APA ethical principles that apply to human research participants, informed consent shall be obtained when voices or images are recorded as data unless Multiple Choice
the research design includes deception and consent for the use of the recording is obtained during debriefing.
According to the Declaration of Helsinki, a research must be reviewed by an independent group of individuals to ensure that __.
the research protocol adheres to accepted ethical standards.
The Nuremberg Code includes _____.
the stipulation that participation in research should be voluntary
The Nuremberg Code includes __.
the stipulation that participation in research should be voluntary.
One way to deal with research fraud is to
train students in the ethics of the research process
According to David Pittenger, a person can easily maintain anonymity on the Internet by
using a pseudonym
In the context of ethical research on Internet, David Pittenger suggests that one can add a layer of protection to participants' privacy by
using multiple Internet groups
A researcher can protect the confidentiality of participants' responses by _____.
using proper software applications using appropriate hardware storing data on a portable storage device
A researcher may need to add more sections to the informed-consent form if research participants _____.
will incur any expenses will be paid may sustain injury
According to Keller and Lee, maintaining anonymity in Internet research may be especially problematic if a participant uses a _____ to respond.
work e-mail account
Confidentiality
Ensuring the security of one's participants' responses
Identify the items of information required by an institutional review board (IRB) to evaluate a research proposal.
Experimental procedures to be used How participants will be acquired Procedures for obtaining informed consent
Debriefing
Explaining the methods used in a study, including any deception
"Ghost" e-mail account
Hides one's actual e-mail address
Identify the categories of research fraud defined by the U.S. Office of Research Integrity.
Data fabrication Falsification Plagiarism
What should be done in case of animal subjects in order to restrain research fraud?
Animal use records should be scrutinized after a study.
Plagiarism
Appropriation of another person's ideas, processes, or results without giving appropriate credit
Anonymity
Assuring one's participants that they cannot be identified as participants in one's study
E-mail stripping software
Choice, Removes identifying information from the e-mails Removes identifying information from the e-mails
Dehoaxing
Convincing participants that the deception is necessary and taking steps to reverse any ill effects of being deceived
What must a researcher and an institutional review board determine before approving a research
If the benefits of the research outweigh the potential risks to participants
According to the U.S. Department of Health and Human Services, in which of the following situations is it mandatory for a researcher to obtain permission from both parents when a child is used as a research subject?
If there is greater than minimal risk involved in the research If there is no direct benefit to the child participant
Identify a function of the U.S. Office of Research Integrity within the U.S. Department of Health and Human Services.
It oversees the integrity of the research process.
The founder of the behaviorist school of psychology was __ __
John Watson
Identify a basic principle presented by the Belmont Report that states that both the researcher and the participant should share the costs and potential benefits of a research study.
Justice
Falsification
Manipulating research materials, equipment, or processes
The groundwork for many of the current ethical standards for psychological and medical research was laid by the __ __.
Nuremberg Code
Identify an accurate statement about using Internet media to conduct a research study.
One must be careful when studying material posted on a social media site.
Identify David Pittenger's suggestion for ethical research on Internet groups.
One should learn about and respect the rules of the Internet group under study.
What should one do to guarantee participants' anonymity if one is using their personal e-mail addresses to contact them?
One should set up temporary "ghost" e-mail accounts. One should use e-mail stripping software.
Identify a true statement about research fraud.
People do not report the detected fraud.
Identify the guidelines to protect Internet research participants' identities as suggested by David Pittenger.
Remove participants' pseudonyms from the data. Eliminate participants' names from the data.
Which of the following issues are included in the educational experiences under the Responsible Conduct of Research (RCR) program?
Research misconduct Responsible authorship
Identify a component of respect for persons, a principle presented in the Belmont Report.
Research participants must be treated as autonomous persons who are capable of making their own decisions.
Identify the components of the beneficence principle of the Belmont Report.
Researchers should not harm participants. Researchers should maximize benefits while minimizing harm.
Fraud may go unreported because the liabilities associated with "blowing the whistle" can be quite severe. Identify the consequences whistle-blowers may have to face in case of research fraud.
They may be vilified. Their credibility is called into question. They may be fired for doing the right thing.
Identify a principle, suggested by Susan Fiske, that institutional review boards must adhere to for smooth functioning.
They must act to protect human research participants against harm and unethical treatment.
True or false: One needs informed consent before studying information posted on a public access social media site like Facebook.
This is false. Information posted on a public access Facebook page can be studied without informed consent. However, one must be careful when studying material posted on a social media site like Facebook.
True or false: In order to treat science ethically, psychologists can misrepresent facts intentionally.
This is false. Psychologists should not steal, cheat, or engage in fraud, subterfuge, or misrepresent facts intentionally in order to treat science ethically and with integrity.
True or false: In 1973, the APA established a set of ethical guidelines for using animals in research.
This is false. The APA (1973) established a set of ethical guidelines for research in which children are used as participants.
True or false: Replication of experiments is expensive and a time-consuming method for guarding against research fraud.
This is true. Replication of experiments is expensive and time consuming and unlikely to occur across labs. Even if a finding cannot be replicated, which does not necessarily mean fraud has occurred.
True or false: The best guard against fraud in science is to imbue researchers during the training process with the idea that ethical research means being honest.
This is true. The best guard against fraud in science is to imbue researchers during the training process with the idea that ethical research means being honest. This process should begin as early as possible.
True or false: The Office of Research Integrity (2013) suggests that whistleblowers are a crucial component in the fight against misconduct in science.
This is true. When misconduct does occur, scientists should be encouraged to blow the whistle when they have strong proof that misconduct took place. The Office of Research Integrity (2013) suggests that whistleblowers are a crucial component in the fight against misconduct in science.
Current regulations in the United States require that certain categories of e-mails be archived and made part of the national record. This compromises anonymity as anyone may be able to gain access to any e-mails related to one's research. Hence, one should suggest participants to
avoid using work e-mail accounts when responding
Depending on the nature of one's research, one may be required to submit _____ to the institutional review board.
a draft of an informed-consent form
According to Susan Fiske, institutional review boards can serve to promote research by
adequately training their staff and researchers concerning their function
According to David Pittenger, a true statement about researchers who study online groups without identifying themselves as researchers is that they should _____.
be mindful of the nature of online groups
With respect to research fraud, if a scientist replaces actual data with false data, he is involved in
data fabrication
A true statement about the U.S. Office of Research Integrity is that it
documents and investigates cases of research fraud in science
David Pittenger offers three arguments for considering the Internet equivalent to a public place. One of his arguments is that Internet use is now so common that users should understand that it
does not afford privacy
Submitting research to an institutional review board (IRB) for review involves
drafting a proposal
The Responsible Conduct of Research (RCR) program is designed by the U.S. Office of Research Integrity to
educate scientists about research fraud
The Responsible Conduct of Research (RCR) program is designed by the U.S. Office of Research Integrity to _____.
educate scientists about research fraud
The role of an institutional review board (IRB) is to
ensure that researchers adhere to established ethical guidelines
In the context of ethical considerations, a researcher's proposal is reviewed to __.
ensure that the safety, well-being, dignity, and rights of participants are protected.
Before conducting a research, a researcher must present his or her research protocol for review of
ethical issues
Early in their academic careers, students should be taught that
ethical research practice requires scientific integrity
Before making an allegation of research fraud, whistle-blowers should _____.
find out what to include in a report familiarize him- or herself with the policies of the institution find out to whom the report should be given