We thoroughly check each answer to a question to provide you with the most correct answers. Found a mistake? Tell us about it through the REPORT button at the bottom of the page. Ctrl+F (Cmd+F) will help you a lot when searching through such a large set of questions.
Additional safeguards that may be included in a social and behavioral study may include:
Remove all direct identifiers from the data as soon as possible.
According to federal regulations, the expedited review process may be used when the study procedures pose:
No more than minimal risk and the research activities fall within regulatory categories identified as eligible.
Which of the following statements about the relationship between an institution and the institution’s IRB(s) is correct?
Officials of the institution may overrule an IRB approval.
In addition to pregnant women, fetuses, and neonates, another subpart of the HHS regulations provides additional protections for which of the following vulnerable populations?
According to the federal regulations, research is eligible for exemption, if:
The research falls into one of eight categories of research activity described in the regulations.
Continuing review of an approved and ongoing study posing more than minimal risk that was initially approved by a convened IRB
Must occur within 12 months of the approval date
A researcher wishes to study generational differences in coping mechanisms among adults who experienced abuse as children. Adequate measures will be instituted to obtain informed consent and ensure that there is no breach of confidentiality. The most likely additional risk is that some subjects may:
Experience emotional or psychological distress.
Risk of harm in social and behavioral sciences generally fall in three categories, which are:
Invasion of privacy, breach of confidentiality, and study procedures
What statement about risks in social and behavioral sciences research is most accurate:
Risks are specific to time, situation, and culture.
The primary purpose of a Certificate of Confidentiality is to:
Protect identifiable research information from compelled disclosure.
A therapist at a free university clinic treats elementary school children with behavior problems who are referred by a social service agency. She is also a doctoral candidate who proposes using data she has and will collect about the children for a case-based research project. Which of the following statements about parental permission is correct?
The parents of the children might feel pressure to give permission to the therapist to use their children’s data so that she will continue to provide services to their children.
A general requirement for informed consent is that no informed consent may include any exculpatory language. Exculpatory language is that which waives or appears to waive any of the subject’s legal rights or releases or appears to release those conducting the research from liability for negligence. Which of the following statements in a consent form is an example of exculpatory language?
Taking part in the research is voluntary, but if you choose to take part, you waive the right to legal redress for any research-related injuries.
A criterion for waiving informed consent is that, when appropriate, subjects are provided additional pertinent information after the study. In which of the following studies would it NOT be appropriate to provide subjects with information about missing elements of consent:
A study in which subjects were assigned to study activities based on an undesirable or unflattering physical characteristic as assessed by members of the research team.
A waiver of the requirement for documentation of informed consent may be granted when:
The only record linking the subject and the research is the consent document and the principal risk is a breach of confidentiality.
As part of the consent process, the federal regulations require researchers to
Provide potential subjects with information at the appropriate reading comprehension level.
In a longitudinal study that will follow children from kindergarten through high school and will collect information about illegal activities, which of the following confidentiality procedures would protect against compelled disclosure of individually identifiable information?
Securing a Certificate of Confidentiality
Which of the following constitutes both a breach of confidentiality (the research data have been disclosed, counter to the agreement between researcher and subjects) and a violation of subjects’ privacy (the right of the individuals to be protected against intrusion into their personal lives or affairs)?
A faculty member makes identifiable data about sexual behavior available to graduate students, although the subjects were assured that the data would be de-identified.
Data are made anonymous by
Destroying all identifiers connected to the data.
When a focus group deals with a potentially sensitive topic, which of the following statements about providing confidentiality to focus group participants is correct?
The researcher cannot control what participants repeat about others outside the group.
A researcher leaves a research file in her car while she attends a concert and her car is stolen. The file contains charts of aggregated numerical data from a research study with human subjects, but no other documents. The consent form said that no identifying information would be retained, and the researcher adhered to that component. Which of the following statements best characterizes what occurred?
There was neither a violation of privacy nor a breach of confidentiality.
Was this helpful?
Let us know if this was helpful. That’s the only way we can improve.