Citi Training, Assessing Risk - SBE, CITI Questions With Complete Solution
The researcher's failure to protect research subjects from deductive
... [Show More] disclosure is the primary ethical violation in which of the following studies? - "Tastes, Ties, and Time (T3)" study (2006-2009)
According to the Belmont Report, the moral requirement that there be fair outcomes in the selection of research subjects, expresses the principle of: - Justice
Humphreys collecting data for the Tearoom Trade study under the pretense that he was a lookout is an example of a violation of the principle of: - Respect for persons
The Belmont principle of beneficence requires that: - Potential benefits justify the risks of harm.
Which of the following studies is linked most directly to the establishment of the National Research Act in 1974 and ultimately to the Belmont Report and federal regulations for human subject protection? - The Public Health Service Study of Untreated Syphilis
Continuing review of an approved and ongoing study posing more than minimal risk that was initially approved by a convened IRB: - Must occur within 12 months of the approval date.
According to federal regulations, the expedited review process may be used when the study procedures pose: - No more than minimal risk and the research activities fall within regulatory categories identified as eligible.
In addition to pregnant women, fetuses, and neonates, another subpart of the HHS regulations provides additional protections for which of the following vulnerable populations? - Prisoners
According to the federal regulations, research is eligible for exemption, if: - The research falls into one of eight categories of research activity described in the regulations.
Which of the following statements about the relationship between an institution and the institution's IRB(s) is correct? - Officials of the institution may overrule an IRB approval.
Risk of harm in social and behavioral sciences generally fall in three categories, which are: - Invasion of privacy, breach of confidentiality, and study procedures
A researcher wishes to study generational differences in coping mechanisms among adults who experienced abuse as children. Adequate measures will be instituted to obtain informed consent and ensure that there is no breach of confidentiality. The most likely additional risk is that some subjects may: - Experience emotional or psychological distress.
The primary purpose of a Certificate of Confidentiality is to: - Protect identifiable research information from compelled disclosure.
If disclosure of a subject's involvement in a specific research study can be potentially harmful to the subject, and the consent form is the only record linking the subject to the research, which of the following would be most helpful: - Obtain a waiver of documentation of informed consent.
A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use. Direct identifiers will not be collected; however, IP addresses may be present in the data set. Risk of harm should be evaluated by: - Both the magnitude (or severity) and the probability (or likelihood) of harm.
A therapist at a free university clinic treats elementary school children with behavior problems who are referred by a social service agency. She is also a doctoral candidate who proposes using data she has and will collect about the children for a case-based research project. Which of the following statements about parental permission is correct? - The parents of the children might feel pressure to give permission to the therapist to use their children's data so that she will continue to provide services to their children. [Show Less]