CITI Module #3
Data are made anonymous by
-Destroying all identifiers connected to the data.
-Requiring all members of the research team to sign confidentiality agreements.
-Keeping the key linking names to responses in a secure location.
-Reporting data in aggregate form in publications resul...
-Destroying all identifiers connected to the data.
-Requiring all members of the research team to sign confidentiality agreements.
-Keeping the key linking names to responses in a secure location.
-Reporting data in aggregate form in publications resulting from the research. - -
Destroying all identifiers connected to the data.
In a longitudinal study that will follow children from kindergarten through high school and
will collect information about illegal activities, which of the following confidentiality
procedures would protect against compelled disclosure of individually identifiable
information?
-Using data encryption for stored files.
-Securing a Certificate of Confidentiality.
-Waiving documentation of consent.
-Using pseudonyms in research reports. - -Securing a Certificate of Confidentiality
When a focus group deals with a potentially sensitive topic, which of the following
statements about providing confidentiality to focus group participants is correct?
, CITI Module #3
-If group members know each other confidentiality is not an issue.
-Using pseudonyms in reports removes the concern about any confidences shared in the
group.
-The researcher cannot control what participants repeat about others outside the group.
-If group participants sign confidentiality agreements, the researcher can guarantee
confidentiality. - -The researcher cannot control what participants repeat about
others outside the group
A researcher leaves a research file in her car while she attends a concert and her car is
stolen. The file contains charts of aggregated numerical data from a research study with
human subjects, but no other documents. The consent form said that no identifying
information would be retained, and the researcher adhered to that component. Which of
the following statements best characterizes what occurred?
-There was neither a violation of privacy nor a breach of confidentiality
-The subjects' privacy has been violated.
-Confidentiality of the data has been breached
-There was both a violation of privacy and a breach of confidentiality. - -There was
neither a violation of privacy nor a breach of confidentiality
Which of the following constitutes both a breach of a confidentiality (the research data
have been disclosed, counter to the agreement between researcher and subjects) and a
, CITI Module #3
violation of subjects' privacy (the right of the individuals to be protected against intrusion
into their personal lives or affairs)?
-A researcher asks cocaine users to provide names and contact information of other
cocaine users who might qualify for a study.
-A faculty member makes identifiable data about sexual behavior available to graduate
students, although the subjects were assured that the data would be de-identified.
-A researcher, who is a guest, audio-records conversations at a series of private dinner
parties to assess gender roles, without informing participants.
-In order to eliminate the effect of observation on behavior, a researcher attends a support
group and records interactions without informing the attendees. - -A faculty member
makes identifiable data about sexual behavior available to graduate students, although the
subjects were assured that the data would be de-identified.
An investigator is studying women recently admitted to a state prison. All potential subjects
must have children under the age of five. Research subjects will be given a basket of toys to
use at their children's first visit that the children can then take home. In assessing this
proposal, the IRB needs to determine that the toys are:
-Educational.
-Not an excessive incentive.
-Of high quality.
-Age appropriate. - -Not an excessive incentive.
, CITI Module #3
An investigator is examining the quality of life for prisoners who are HIV positive using
surveys followed by interview. The IRB must ensure that:
The survey instrument is standardized.
Confidentiality of the prisoners' health status is maintained.
All prisoners receive HIV testing.
A medical doctor serves as co-investigator. - -Confidentiality of the prisoners' health
status is maintained.
Which of the following statements about prison research is true?
Participation in research can be considered during parole hearings.
Researchers may study the effects of privilege upgrades awarded by the prison.
It is permissible for risks to be higher than those that would be accepted by non-prisoners.
The regulations prohibit compensating prisoners. - -Researchers may study the
effects of privilege upgrades awarded by the prison.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller verifiedtutor80. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.99. You're not tied to anything after your purchase.