100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Chapter 9 Ethics in Research $7.99   Add to cart

Exam (elaborations)

Chapter 9 Ethics in Research

 0 view  0 purchase

Chapter 9 Ethics in Research

Preview 4 out of 35  pages

  • November 27, 2024
  • 35
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
All documents for this subject (14)
avatar-seller
senje
Chapter 9: Ethics in Research
Test Bank



MULTIPLE CHOICE


1. A research study offers elderly men who have, in the past, been prison inmates $1,500 for
participation in an all-day workshop at which they agree to be hypnotized and tell stories of
incarceration, which are later published. The research participants are allowed to listen to the
tapes of what they say under hypnosis and to withdraw permission to use any part of the
information. Why is this scenario a violation of self-determination?
a. Allowing participants to withdraw permission to use part of the research information violates
the study integrity and represents deception.
b. It is an example of coercion.
c. Prisoners are a vulnerable population and should not be used as research subjects.


d. What is said under hypnosis may not be true.


ANS: B
The right to self-determination is based on the ethical principle of respect for persons. This
principle holds that because humans are capable of self-determination, or controlling their
own destiny, they should be treated as autonomous agents who have the freedom to conduct
their lives as they choose without external controls. A subject’s right to self-determination
can be violated through the use of (1) coercion, (2) covert data collection, and (3) deception.
Coercion occurs when an overt threat of harm or excessive reward is intentionally presented
by one person to another to obtain his or her compliance. In the example, offering elderly
men
$1,500 for one day could be considered offering an excessive reward: therefore, it is an act of
coercion violating the human right to self-determination.


DIF: Cognitive Level: Analysis REF: Page 164


2. A researcher working for Google collects data on fair treatment in the workplace. He attempts
to attach one of the raw data forms to a message to himself, so that he can finish the data

, analysis at home that evening, but accidentally sends it to another employee who had
provided data for the study. The two employees, coincidentally, have an identical opinion
about fair treatment in the workplace. This best describes an example of a violation of which
of the following human rights?
a. Confidentiality
b. Fair treatment
c. Protection from harm
d. None of these—no ethical violation occurred, because the two subjects share a point of view.


ANS: A
Confidentiality is the researcher’s management of private information shared by a subject that
must not be shared with others without the authorization of the subject. In the example,
sending one research subject the raw data of a different subject is a direct breach of
confidentiality. A breach in confidentiality can occur when a researcher, by accident or direct
action, allows an unauthorized person to gain access to raw study data. The right to fair
treatment is based on the ethical principle of justice. This principle holds that each person
should be treated fairly and should receive what he or she is due or owed. The right to
protection from discomfort and harm is based on the ethical principle of beneficence, which
holds that one should do good and, above all, do no harm.


DIF: Cognitive Level: Application REF: Page 172


3. In a study of outpatients experiencing panic attacks, a researcher was working in a busy clinic
waiting room and left his computer to consent a new study participant. A transcription of a
patient interview was displayed, and at the end of the transcription was the patient’s medical
record number and a list of medications currently taken. The researcher had not closed down
the screen, and when he returned to his computer, he found an adult patient playing a video
game on the computer. This best describes an example of a violation of which of the
following human rights?
a. Protection from the harm of exposure
b. Security
c. Confidentiality
d. Privacy

,
, .com - The Marketplace to Buy and Sell your Study Material




ANS: D
Privacy is an individual’s right to determine the time, extent, and general circumstances under
which personal information will be shared with or withheld from others. This information
consists of one’s attitudes, beliefs, behaviors, opinions, and records. The Privacy Act of 1974
provided the initial protection of an individual’s privacy. Because of this act, data collection
methods were to be scrutinized to protect subjects’ privacy, and data cannot be gathered from
subjects without their knowledge. Individuals also have the right to access their records and
to prevent access by others. The intent of this act was to prevent the invasion of privacy that
occurs when private information is shared without an individual’s knowledge or against his or
her will. Invading an individual’s privacy might cause loss of dignity, friendships, or
employment or create feelings of anxiety, guilt, embarrassment, or shame. The HIPAA
Privacy Rule expanded the protection of an individual’s privacy, specifically his or her
protected individually identifiable health information, and described the ways in which
covered entities can use or disclose this information. De-identifying health data involves
removing 18 elements that could be used to identify an individual. An important one on this
list is the individual’s medical record number. In the example, the researcher’s use of an
actual patient identification number on a transcription risks the human right to privacy; a code
number should have been used instead.


DIF: Cognitive Level: Application REF: Page 169


4. Ellen is a participant in a research study. She will receive either the customary medication to
treat her metastatic colon cancer or a new medication that has shown better results in animal
studies and one small human study. This is research.
a. Coercive
b. Correlational c. Therapeutic d. Dangerous


ANS: C
Therapeutic research gives the patient an opportunity to receive an experimental treatment
that might have beneficial results. Nontherapeutic research is conducted to generate
knowledge for a discipline, and the results from the study might benefit future patients but

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller senje. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

62890 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart