CITI training includes: Responsible Conduct, Ethics, RCR, Law, HTH & IRB

Which of the following is true regarding data analysis?

Data analysis methods should be specified in advance before a study begins.

Which of the following most accurately describes data lifecycle management (DLM)

It refers to the tools and processes for handling data during a research study and after it concludes.

Which of the following is true regarding the reporting of research results?

Clear specification of the methods and procedures used is essential.

What is the primary responsibility of oversight bodies such as an IRB or an IACUC

To detect compliance with regulatory requirements, including those relating to protecting research subjects.

Which of the following is true regarding data acquisition?

Data acquisition should follow a detailed collection plan that is set in advance.

In the research context, the term validity most commonly refers to:

Whether operationalized terms actually measure what they purport to measure.

What are the three main goals of data lifecycle management?

Confidentiality, availability, and integrity

Which of the following is true regarding data sharing and stewardship

Researchers who receive federal funding may have to adhere to a data sharing requirement.

If an employer allows a friendship to interfere with a hiring decision, this is typically referred to as:

A personal conflict of interest.

If researchers allow their moral or other personal beliefs to influence their objectivity, this is most likely an example of:

A conflict of conscience

The entity that normally is supposed to determine whether an academic researcher's conflict of interest can be managed is:

A conflict of interest committee

Which of the following most accurately describes a conflict of commitment?

It occurs when outside activities interfere with obligations to one's primary employer.

The main focus of NIH's conflict of interest policy is:

Financial conflicts of interest

Which of the following most accurately describes an institutional conflict of interest?

It occurs when an institution's financial interests could interfere with its research activities

Which of following is true about the management of conflicts of interest?

Management plans are often created to reduce the impact of conflicts of interest rather than completely eliminating them

Which of following is true about conflicts of interest

They increase the likelihood of bias.

Which of the following statements best exemplifies the importance of mentoring?

A mechanism to transmit values and standards of professional conduct.

What is the most appropriate course of action for a trainee who has a problem with a mentor?

After first attempting to communicate directly with the mentor, the trainee should seek the counsel of a trusted senior person in the department or organization.

Which of the following most accurately describes the responsibilities of a trainee in the mentoring relationship?

The trainee must take an active role in the relationship and clearly communicate needs and expectations.

Which of the following statements most accurately describes the mentoring relationship?

Mentors teach trainees about aspects of academic life that are not covered in textbooks

The defining characteristic of a mentor is someone who:

Takes a sincere interest in the growth and development of a trainee.

According to the U.S. Federal Research Misconduct Policy, fabrication involves:

Making up data or results and recording or reporting them.

Which of the following is most likely to be considered plagiarism?

Using materials from a source without proper citation.

Which of the following is the most effective strategy for preventing research misconduct?

Good mentoring

Which of the following is true regarding the U.S. Federal Research Misconduct Policy?

To have a misconduct finding, the action must have been committed intentionally, knowingly, or recklessly.

Which type of research misconduct most likely occurred if someone intentionally removes data points on a graph in order to generate a deceptive conclusion?

Falsification

According to U.S. Federal Research Misconduct Policy, which of the following is considered to be research misconduct?

Good mentoring

In response to a research misconduct allegation, what is the next main phase that takes place after the inquiry if there is sufficient evidence to proceed?

An investigation

According to the U.S. Federal Research Misconduct Policy, falsification involves:

Manipulating research materials, equipment, or processes, or changing or omitting data.

What is the primary responsibility of oversight bodies such as an IRB or an IACUC?

To detect compliance with regulatory requirements, including those relating to protecting research subjects.

What are the three main goals of data lifecycle management?

Confidentiality, availability, and integrity

In the research context, the term validity most commonly refers to:

Whether operationalized concepts actually measure what they purport to measure.

Which of the following statements is true concerning data selection?

Establishing a data selection strategy prior to collecting data decreases the chance of a biased outcome.

Which of following is most likely to own the data resulting from a research project?

The institution where a federally-funded project takes place.

Which of the following is true regarding data sharing and stewardship?

Agencies that fund research may include data sharing requirements in their funding contracts.

Which of the following most accurately describes the practice of ghost authorship?

It is a situation where the individual who wrote the manuscript is not listed as an author.

Which of the following is a responsibility of each author?

Confirming that data have been accurately presented.

Which of the following is an example of plagiarism?

Presenting someone else's ideas or words and claiming them as one's own.

Which of the following is true regarding an acknowledgments section?

The contributions of students and technicians are often listed in the acknowledgments section if they do not meet all of the criteria for authorship.

Which of the following is true regarding publishing the same content in multiple papers?

Using the same content in multiple papers is deceptive if it is not properly disclosed.

Which author is normally responsible for sharing reprints of a publication with readers?

The corresponding author.

Which of the following statements is true regarding the International Committee of Medical Journal Editors (ICMJE) guidelines?

Individuals who do not meet the criteria for authorship but who have made a noteworthy contribution are normally listed in the acknowledgments section.

Which of the following is the primary criterion for authorship?

Having made a significant intellectual contribution to the work.

Which of the following statements is true regarding authorship practices?

Different disciplines have different practices about who should be included as an author.

Which of the following statements most accurately describes the review process for grant proposals?

Funding agencies usually have committees, often with external reviewers, that assess the quality of the proposal.

A reviewer's main responsibility is to:

Be professional and prompt.

The two main criteria that the National Science Foundation (NSF) uses to evaluate grant proposals are:

Intellectual merits and broader impacts.

Which of the following statements is true regarding the responsibilities of a reviewer?

A reviewer's conflict of interest should be disclosed to the journal editor or grant agency

Which of the following is true regarding single-blind and double-blind review:

Under single-blind review, the identity of the author is revealed to the reviewer.

The main reason that grant proposal reviewers with a conflict of interest should remove themselves from the review process is because:

Their removal lessens the chance that bias will affect the review process?.

Which of the following is most directly related to successful mentoring?

Someone who is committed to the professional development of the trainee.

What is the most appropriate course of action for a trainee who has a problem with a mentor?

After first attempting to communicate directly with the mentor, the trainee should seek the counsel of a trusted senior person in the department or organization.

Which of the following is to be avoided when seeking an effective mentor?

Trainees should assume that whoever is assigned to them as the thesis or research adviser will be their best choice for a mentor.

Which of the following most accurately describes the responsibilities of a trainee in the mentoring relationship?

The trainee must take an active role in the relationship and clearly communicate needs and expectations.

Which of the following statements most accurately describes the mentoring relationship?

Mentors teach trainees about aspects of academic life that are not covered in textbooks.

Which of the following statements best exemplifies the importance of mentoring?

A mechanism to transmit values and standards of professional conduct.

The defining characteristic of a mentor is someone who:

Takes a sincere interest in the growth and development of a trainee.

Which of the following is most likely to create a poor relationship between mentor and trainee?

A faculty member searches out trainees merely for that person's own career advancement.

Which of following is true about the management of conflicts of interest?

Management plans are often created to reduce the impact of conflicts of interest rather than completely eliminating them.

If researchers allow their moral or other personal beliefs to influence their objectivity, this is most likely an example of:

A conflict of conscience

Which of the following most accurately describes a conflict of commitment?

It occurs when outside activities interfere with obligations to one's primary employer.

The main focus of NIH's conflict of interest policy is:

Financial conflicts of interest

The entity that normally is supposed to determine whether an academic researcher's conflict of interest can be managed is:

A conflict of interest committee

Which of the following most clearly illustrates an example of an academic conflict of interest?

A researcher becomes overly attached to a specific research outcome.

Which of the following most accurately describes an institutional conflict of interest?

It occurs when an institution's financial interests could interfere with its research activities.

Which of following is true about conflicts of interest?

They increase the likelihood of bias.

if an employer allows a friendship to interfere with a hiring decision, this is typically referred to as:

A personal conflict of interest.

Data ownership is typically determined by:

The type and source of funds used to support the project.

Which of the following is a key reason why international collaborations can be challenging?

Language barriers and cultural differences among collaborators can complicate communication.

Which of the following is true regarding academic-industry collaborations?

The industry sponsor typically owns the data from research that it funds.

What is the most appropriate process for determining which journal a collaborative research team should submit their work to?

It should be discussed early on in the collaboration by the members of the research team.

Which of the following is true regarding industry-sponsored research?

Industry sponsors of research may place restrictions on the disclosure of research results.

What is the main function of the Bayh-Dole Act of 1980 as it relates academic institutions?

It allows institutions to have control over the intellectual property from federally-funded research.

What is the main function of a Technology Transfer Office?

It helps researchers to commercialize their work.

A research collaboration can be enhanced by:

Discussing intellectual property issues while the collaboration is forming.

Which of the following is true regarding the use of animals in research?

The attending veterinarian must be allowed to have access to all research animals at all times.

Which of the following is the main reason why proper training in euthanasia techniques is important?

Improper techniques can cause unnecessary pain and distress in animals.

Which of the following is empowered by the U.S. federal government to review and approve research activities involving vertebrate animals?

The Institutional Animal Care and Use Committee (IACUC)

Prior to implementing any significant change in the use of animals, what is the most important thing that the research team must do?

Obtain IACUC approval for the change.

Which of the following most accurately describes the process that must occur when working with research animals covered by U.S. federal regulations?

The research team must obtain IACUC approval for the proposed research procedures prior to starting the work.

Which entity is responsible for monitoring institutional compliance with PHS Policy?

The Office of Laboratory Animal Welfare (OLAW)

What is the primary purpose of the "3Rs" concept from Russell and Burch?

To decrease the use of animals in research and to minimize pain and distress caused by animal experiments.

Which of the following is the general guideline that IACUCs use to evaluate the potential pain of a procedure conducted with animals?

Any procedure that causes pain or distress in human beings may cause pain or distress in other animals.

Which justification would an IACUC most likely accept if a research team plans to withhold pain relief (analgesia) from animals during a project?

...

Which statement best describes information that must be included in a consent form:

A description of the research's potential benefits and risks.

Which of the following best describes when a protocol may be eligible for expedited review by the IRB:

The study involves no more than minimal risk and meets one of the allowable categories of expedited review specified by the federal government.

Which of the following statements most clearly illustrates the principle of beneficence:

Determining whether the benefits of a study outweigh the risks.

Which statement best describes the role of an IRB:

a committee that reviews different types of human subjects research.

Which of the following studies most directly contributed to the establishment of the National Research Act and the creation of the Belmont Report:

The Tuskegee Study.

The three ethical principles discussed in the Belmont Report are:

Respect for Persons, Beneficence, Justice.

As a first step, what must be done before enrolling a young child in a research protocol:

the risks and benefits must be explained to the child's parents or legally authorized representative.

Which statement most accurately describes the process leading to the development of the Nuremberg Code:

it was created in response to the harms caused by Nazi researchers around the time of the Second World War.

Which of following protocols most likely requires IRB review:

A study to evaluate a newly designed wheelchair by asking elderly individuals to use it.

Which statement best describes what an IRB is responsible for reviewing:

Any form of research involving a human subject.

With the context of rcr, stewardship primarily refers to:

The obligation to use resources available for research ethically in order to conduct the best research possible

Within the context of rcr, social responsibility primarily refers to:

The obligation to design technology or acquire information in ways that take into account what effects those actions may have on society

Which of the following most accurately describes U.S. federal policy related to rcr instruction?

Some federal agencies have rcr policies but they differ in terms of the particular format of training that is required

Within the context of rcr, compliance primarily refers to:

The obligation to follow specific directive, such as laws and regulations, that govern a research activity

Which of the following most accurately describes the main goal of rcr education and training?

To promote greater awareness of proper research practice and research ethics

Within the context to rcr, integrity primarily refers to:

Having a sincere commitment to upholding one's word and adhering to ethical and professional standards

The view that there is a social contract between researchers and the public is most accurately described by stating that:

The public supports research in various ways and researchers have a corresponding obligation to avoid abusing the public's trust

Which of the following is true regarding an acknowledgments section?

The contributions of technicians and other researchers are often listed in the acknowledgements section if they do not meet all of the criteria for authorship

Which author is normally responsible for sharing reprints of a publication with readers?

The corresponding author

Which of the following statements is true regarding authorship practices?

Different disciplines have different practices about who should be included as an author.

Which of the following is the primary criterion for authorship?

Having made a significant intellectual contribution to the work.

Which of the following statements is true regarding the International Committee of Medical Journal Editors (ICMJE) guidelines?

Individuals who do not meet the criteria for authorship but who have made a noteworthy contribution are normally listed in the acknowledgments section.

Which of the following is a responsibility of each author?

Confirming that data have been accurately presented

Which of the following is an example of plagiarism?

Presenting someone else's ideas or words and claiming them as one's own

Which of the following most accurately describes the practice of ghost authorship?

It is a situation where the individual who wrote the manuscript is not listed as an author

Which of the following is true regarding authors who seek to publish the same content in multiple papers?

Using the same content in multiple papers is deceptive if it is not properly disclosed to journal editors or other relevant entities

What is the main function of a technology transfer office?

It helps researchers to commercialize their work

The most important factor determining whether a research collaboration will be successful is:

Whether there is ongoing communication about goals and responsibilities

What is the main function of the Bayl-Dole Act of 1980 as it relates to academic institutions?

It allows institutions to have control over the intellectual property from federally-funded research

Which of the following is a key reason why international collaborations can be challenging?

Language barriers and cultural differences among collaborators can complicate communication

Which of the following is true regarding academic-industry collaborations?

The industry sponsor typically owns the data from research that it funds

What is the most appropriate process for determining which journal a collaborative research team should submit their work to?

It should be discussed early on in the collaboration by the members of the research team.

Which of the following is true regarding industry-sponsored research?

Industry sponsors of research may seek to place restrictions on the disclosure of research results.

Which of the following statements is true regarding international research and U.S. regulations?

U.S. funded research is often governed by U.S. regulations no matter where the research takes place

Data ownership is typically determined by:

The type and source of funds used to support the project

A research collaboration can be enhanced by:

Discussing intellectual property issues while the collaboration is forming

Which of the following most accurately describes a conflict of commitment?

It occurs when outside activities interfere with obligations to one's primary employer

Which of the following most accurately describes an institutional conflict of interest?

It occurs when an institution's financial or non-financial interests could interfere with its research activities

Which of the following is true about the management of conflicts of interest?

Management plans are often created to reduce the impact of conflicts of interest rather than completely eliminating them.

If researchers allow their moral or other personal beliefs to influence their objectivity, this is most likely an example of:

A conflict of conscience

The entity that normally is supposed to determine whether an academic researcher's conflict of interest can be managed is:

A conflict of interest committee

Which of the following is true about conflicts of interest?

Conflicts of interest increase the likelihood of bias

If a friendship with an applicant could interfere with a hiring decision, this is typically referred to as:

A personal conflict of interest

The main focus of NIH's conflict of interest policy is:

Financial conflicts of interest

What are the three main goals of data lifecycle management?

Confidentiality, availability, and integrity

Which of the following is true regarding data analysis?

Data analysis methods should be specified in advance before a study begins

Which of the following is true regarding data acquisition?

Data acquisition should follow a detailed collection plan that is set in advance

Which of the following is true regarding data sharing and stewardship?

Researchers who receive federal funding may have to adhere to a data sharing requirement

What is the primary responsibility of oversight bodies such as IRB or an IACUC?

To detect compliance with regulatory requirements, including those relating to protecting research subjects

Which of the following most accurately describes data lifecycle management (DLM)?

It refers to the tools and processes for handling data during a research study and after it concludes

Which of the following is most likely to own the data resulting from a research project?

The institution where a federally-funded project takes place

Which of the following statements is true concerning data selection?

Establishing a data selection strategy prior to collecting data decreases the chance of a biased outcome.

Which of the following is true regarding the reporting of research results?

Clear specification of the methods and procedures used is essential

In the research context, the term validity most commonly refers to:

Whether operationalized terms actually measure what they purport to measure

Which of the following statements about mentoring is true?

Mentors can provide valuable advice to trainees regarding career decisions and contacts with leaders in their field of research

Which of the following most accurately describes good mentoring practice?

Encouraging trainees to receive mentoring from a collection of individuals

Which of the following most accurately describes the responsibilities of a trainee in the mentoring relationship?

The trainee must take an active role in the relationship and clearly communicate needs and expectations

What is the most appropriate course of action for a trainee who has a problem with a mentor?

After first attempting to communicate directly with the mentor, the trainee should seek counsel of a trusted senior person in the department or organization

The defining characteristic of a mentor is someone who:

Takes a sincere interest in the growth and development of a trainee

Which of the following is mostly likely to create a poor relationship between a mentor and a trainee?

A mentor who searches out trainees merely for the mentor's own career advancement

Which of the following is most directly related to successful mentoring?

Someone who is committed to the professional development of the trainee

Which of the following statements most accurately describes the mentoring relationship?

Mentors teach trainees bout aspects of academic life that are not covered in textbooks

Which of the following statements is true regarding the responsibilities of reviewers?

Reviewers should identify the positive and negative aspects of a manuscript, and indicate where improvements are needed

Which of the following is true regarding the traditional peer review process:

Under single-blind review, the identity of the author is revealed to the reviewer.

A reviewer's main responsibility is to:

Be professional and prompt

Which of the following is the most appropriate step to take if authors believe that their manuscript was reviewed unfairly?

the author can contact the editor with their concerns

The two main criteria that the National Science Foundation (NSF) uses to evaluate grant proposals are:

Intellectual merit and broader impact

Reviewers have a responsibility to promote ethical peer review by:

Preserving the confidentiality of the submission

The main reason that grant proposal reviewers with a conflict of interest should remove themselves from the review process is because:

Their removal lessens the chance that bias will affect the review process

Which of the following statements most accurately describes the review process for grant proposals?

Funding agencies usually have committees, often with external reviewers, that assess the quality of the proposal

Which of the following statements is true regarding the responsibilities of a reviewer?

A reviewer's conflict of interest should be disclosed to the journal editor or grant agency

The main reason that the Royal Society of London developed the modern form of peer review was to:

Control the quality of published papers.

Which of the following is true regarding the U.S. Federal Research Misconduct Policy?

To have a misconduct finding, the action must have been committed intentionally, knowingly, or recklessly

If a researcher creates the idea for a project and is not listed in the preferred author order position on resulting publications, is this considered to be research misconduct under federal policy?

No; instead it is a type of authorship dispute

Which of the following is most likely to be considered plagiarism?

Using materials from a source without proper citation

Which of the following is the most effective strategy for preventing research misconduct?

Good mentoring

Which type of research misconduct most likely occurred if someone intentionally removes data points from the data set in order to generate a deceptive conclusion?

Falsification

According to U.S. Federal Research Misconduct Policy, which of the following is considered to be research misconduct?

Plagiarism

According to the U.S. Federal Research Misconduct Policy, fabrication involves:

Making up data or results and recording or reporting them

The typical first main phase in response to a research misconduct allegation is called:

The inquiry

Which of the following is true regarding research misconduct?

Federal funding agencies typically rely on an institution to make the initial response to an allegation of research misconduct

Which type of inappropriate practice mostly likely occurred if a researcher takes credit for someone else's idea and does not acknowledge the original source?

Plagiarism

According to the U.S. Federal Research Misconduct Policy, falsification involves:

Manipulating research materials, equipment, or processes, or changing or omitting data

In response to a research misconduct allegation, what is the next main phase that takes place after the inquiry if there is sufficient evidence to proceed?

The investigation

Paraphrasing another author's paragraph by substituting one or two words in each sentence and then adding one citation to the author at the end of the paragraph:

May constitute plagiarism because the original material has not been sufficiently modified to constitute a proper paraphrase

An idea is most likely to represent "common knowledge" if:

It can be safely assumed that the readers and the author are both thoroughly familiar with the ideas and its source

Authors who reuse portions of text that have appeared in one of their earlier published papers run the risk of being accused by journal editors of:

Self-plagiarism

Which of the following situations is most likely to constitute an act of plagiarism?

Copying someone else's text word-for-word without using quotation marks and adding a citation at the end of the material

Ethical writing and scholarship is based on an implicit contract between the author and readers, whereby reader assume that what they read is accurate, has been written by the author, and has:

Not been disseminated before unless noted otherwise

Which one of the following statements most accurately describes how plagiarism has been defined in this module?

Plagiarism applies not only to ideas that are found in print but also those that are communicated verbally

Proper paraphrasing of a sentence written by someone else may be accomplished by:

Using your own words and writing voice to express the idea conveyed in the sentence

When authors summarize the work of others, they typically should:

Provide a condensed (shorter) version of the original material

According to federal research misconduct policies, what is the maximum number of consecutive words that one can use before it is classified as an instance of plagiarism?

There is no official, federal standard for the number of consecutive words that can be used

Which of the following situations is most likely to constitute an instance of plagiarism?

Summarizing a published article in 2-3 distinct paragraphs and including this in a paper

Unless the subject matter is considered common knowledge, citations are necessary when writing about:

Ideas, methodologies, or data from other authors and also your own previously published ideas, methodologies, or data

The reuse of one's previously published material in a new journal is most appropriate if:

The author informs all the relevant parties and obtains permission to do so

Which of the following are the three principles discussed in the Belmont Report?
A. IRB review, Federal regulations, Declaration of Helsinki.
B. Informed Consent, Institutional Assurance, Researcher responsibility.
C. Privacy, Confidentiality, Equitable s

D. Respect for Persons, Beneficence, Justice.

Which of the following is an example of how the Principle of Beneficence can be applied to a study employing human subjects?
A. Providing detailed information about the study and obtaining the subject's consent to participate.
B. Determining that the stud

B. Determining that the study has a maximization of benefits and a minimization of risks.

All of the following are true regarding the Belmont Report, EXCEPT:
A. The Belmont Report describes the need to carefully consider how research discoveries and risks will be fairly distributed in the society.
B. The Belmont Report describes the concept of

D. The Belmont Report indicates that it is necessary to rigorously avoid conflicts

Which of the following studies is linked most directly to the establishment of the National Research Act in 1974 and ultimately to the Belmont Report and Federal regulations for human subject protection?
A. The Public Health Service Tuskegee Study of Untr

A. The Public Health Service Tuskegee Study of Untreated Syphilis in the Negro Male.

The Belmont principle of beneficence requires that:
A. Subjects derive individual benefit from study participation.
B. Potential benefits justify the risks of harm.
C. The study makes a significant contribution to generalizable knowledge.
D. Risks are man

B. Potential benefits justify the risks of harm.

Humphreys collecting data for the Tearoom Trade study under the pretense that he was a lookout is an example of a violation of the principle of:
A. Respect for persons.
B. Justice.
C. Beneficence.

A. Respect for persons.

According to the Belmont Report, the moral requirement that there be fair outcomes in the selection of research subjects, expresses the principle of:
A. Beneficence.
B. Respect for persons.
C. Justice.

C. Justice.

Which of the following is an example of how the principle of beneficence is applied to a study involving human subjects?
A. Ensuring that subjects understand that participation is voluntary.
B. Ensuring that the selection of subjects is fair.
C. Providing

D. Ensuring that risks are reasonable in relationship to anticipated benefits.

A subject in a clinical research trial experiences a serious, unanticipated adverse drug experience. How should the investigator proceed, with respect to the IRB, after the discovery of the adverse event occurrence?
A. Do not report the adverse drug exper

D. Report the adverse drug experience in a timely manner, in keeping with the IRB's policies and procedures, using the forms or the mechanism provided by the IRB.

How long is an investigator required to keep consent documents, IRB correspondence, and research records?
A. Until the study is closed
B. Until data analysis is complete
C. For a minimum of three years after completion of the study
D. As long as the inves

C. For a minimum of three years after completion of the study

According to federal regulations, which of the following best describes when expedited review of a new, proposed study may be used by the IRB?
A. The study involves no more than minimal risk and meets one of the allowable categories of expedited review sp

A. The study involves no more than minimal risk and meets one of the allowable categories of expedited review specified in federal regulations

Amendments involving changes to IRB approved protocols do NOT need prior IRB approval if:
A. The investigator keeps careful records of all changes and includes them in the final report.
B. They only involve changes to the consent form.
C. They are eligibl

D. The changes must be immediately implemented for the health and well being of the subject.

IRB continuing review of an approved protocol must:
A. Be conducted by a convened IRB.
B. Include copies of all signed consent forms.
C. Occur only when the level of risk changes.
D. Occur at least annually.

D. Occur at least annually.

A therapist at a free university clinic treats elementary school children with behavior problems who are referred by a social service agency. She is also a doctoral candidate who proposes using data she has and will collect about the children for a case-b

B. The parents of the children might feel pressure to give permission to the therapist to use their children's data so that she will continue to provide services to their children.

A general requirement for informed consent is that no informed consent may include any exculpatory language. Exculpatory language is that which waives or appears to waive any of the subject's legal rights or releases or appears to release those conducting

D. Taking part in the research is voluntary, but if you choose to take part, you waive the right to legal redress for any research-related injuries.

A criterion for waiving informed consent is that, when appropriate, subjects are provided additional pertinent information after the study. In which of the following studies would it NOT be appropriate to provide subjects with information about missing el

D. A study in which subjects were assigned to study activities based on an undesirable or unflattering physical characteristic as assessed by members of the research team.

A waiver of the requirement for documentation of informed consent may be granted when:
A. The subjects are literate in their own language; however, they do not read, write, or speak English
B. The only record linking the subject and the research is the co

B. The only record linking the subject and the research is the consent document and the principal risk is a breach of confidentiality.

As part of the consent process, the federal regulations require researchers to:
A. Provide potential subjects with information at the appropriate reading comprehension level.
B. Provide a list of the IRB members who reviewed the protocol.
C. Recommend tha

A. Provide potential subjects with information at the appropriate reading comprehension level.

Data are made anonymous by
A. Keeping the key linking names to responses in a secure location.
B. Reporting data in aggregate form in publications resulting from the research.
C. Requiring all members of the research team to sign confidentiality agreement

D. Destroying all identifiers connected to the data.

In a longitudinal study that will follow children from kindergarten through high school and will collect information about illegal activities, which of the following confidentiality procedures would protect against compelled disclosure of individually ide

D. Securing a Certificate of Confidentiality.

When a focus group deals with a potentially sensitive topic, which of the following statements about providing confidentiality to focus group participants is correct?
A. Using pseudonyms in reports removes the concern about any confidences shared in the g

D. The researcher cannot control what participants repeat about others outside the group.

A researcher leaves a research file in her car while she attends a concert and her car is stolen. The file contains charts of aggregated numerical data from a research study with human subjects, but no other documents. The consent form said that no identi

D. There was neither a violation of privacy nor a breach of confidentiality

Which of the following constitutes both a breach of a confidentiality (the research data have been disclosed, counter to the agreement between researcher and subjects) and a violation of subjects' privacy (the right of the individuals to be protected agai

D. A faculty member makes identifiable data about sexual behavior available to graduate students, although the subjects were assured that the data would be de-identified.

A faculty member wants to measure the effectiveness of a new psychological assessment instrument before including it in his new textbook. He plans to conduct a pilot test by administering both the new instrument and an established instrument and then comp

D. Students taking one of his courses

An investigator is recruiting subjects for a study of a new antidepressant drug. The investigator has targeted a population of patients who might clearly benefit, but who are also institutionalized for a variety of psychiatric conditions. The patients are

B. The patients are institutionalized.

An investigator planning to study behavioral changes during alcohol intoxication will pay subjects $600 for 6 hours of testing that includes drinking a moderate level of alcohol and completing several written questionnaires. He plans to recruit college st

A. Potential undue influence or coercion of subjects

A group of elderly men, whose government disability benefits are the sole source of income, is approached regarding an experimental research study. The study involves using different therapeutic interventions in men with colon cancer. The study involves m

D. Undue influence on the subjects

A situation in which financial or other personal considerations have the potential to compromise or bias professional judgment and objectivity is an example of:
A. Fraud
B. Research Misconduct
C. Conflict of Interest
D. Malfeasance

C. Conflict of Interest

A conflict of interest implies:
A. The elimination of bias.
B. An awareness of bias.
C. The actual involvement of bias.
D. The potential for bias.

D. The potential for bias.

The 1998 FDA regulations for requiring disclosure of significant financial interest reflect which threshold:
A. Any equity interest in a publicly held company that exceeds $50,000
B. Any equity interest in a publicly held company that exceeds $5,000
C. An

B. Any equity interest in a publicly held company that exceeds $5,000

The most important ethical concerns related to conflicts of interest in research are:
A. Establishing open dialog with sponsors and security of study records
B. Maintaining a supply of volunteers for research studies and their active involvement in resear

C. Ensuring the objectivity of research and the protection of human subjects

Current NIH rules require investigators to disclose details regarding financial conflicts of interest to:
A. Institutional Review Boards
B. Designated institutional officials
C. Funding agency or sponsor
D. Subjects/participants

B. Designated institutional officials

The Belmont principle of beneficence requires that:
A. Subjects derive individual benefit from study participation.
B. Potential benefits justify the risks of harm.
C. The study makes a significant contribution to generalizable knowledge.
D. Risks are man

B. Potential benefits justify the risks of harm.

According to the Belmont Report, the moral requirement that there be fair outcomes in the selection of research subjects, expresses the principle of:
A. Beneficence.
B. Respect for persons.
C. Justice.

C. Justice

The researcher's failure to protect research subjects from deductive disclosure is the primary ethical violation in which of the following studies?
A. Milgram's "Obedience to Authority" study
B. The Tuskegee study
C. Zimbardo's "Stanford Prison Experiment

D.

Humphreys collecting data for the Tearoom Trade study under the pretense that he was a lookout is an example of a violation of the principle of:
A. Justice.
B. Beneficence.
C. Respect for persons.

C.

Which of the following studies is linked most directly to the establishment of the National Research Act in 1974 and ultimately to the Belmont Report and Federal regulations for human subject protection?
A. The Public Health Service Tuskegee Study of Untr

A.

A professor at Big State University is writing a biography about Bill Gates and conducting oral histories with all of Bill Gates' friends, family members and business acquaintances. The researcher submits the research proposal to the institution's IRB. Wh

B. The IRB will not review this study because it is not research as defined by the federal regulations.

According to the federal regulations, human subjects are living human beings about whom an investigator obtains data through interaction or intervention with the individual or:
A. De-identified private information.
B. Observations of public behavior.
C. I

D. Identifiable private information

According to the federal regulations, which of the following studies meets the definition of research with human subjects?
A. A researcher uses the Customs Office's passenger lists for ships bringing immigrants to the US between 1820-1845 to track the num

C.

According to the federal regulations, which of the following studies meets the definition of research with human subjects?
A. A researcher conducts a comparison of the comments made in a publicly available blog and the blogger's comments on a similar topi

C.

According to the federal regulations, which of the following studies meets the definition of research with human subjects?
A. A researcher receives anonymized data for secondary analysis from a survey about gender-related differences in stress levels cond

C.

Census data is an example of:
Public information.
Private behavior.
Private information.
Public behavior.

Public information

A medical record is an example of:

private information

According to the federal regulations, which of the following studies meets the definition of research with human subjects?
A study of twenty 4th grade classrooms in which researchers ask the schools to systematically vary the time of day reading is taught

A study of twenty 4th grade classrooms in which researchers ask the schools to systematically vary the time of day reading is taught, and collect weekly assessments of reading comprehension for each child over a three-month period.

In addition to pregnant women, fetuses, and neonates, another subpart of the HHS regulations provides additional protections for which of the following vulnerable populations?

prisoners

According to the federal regulations, research is eligible for exemption, if:
All the subjects are adults and the risk is minimal.
The investigator is experienced in the field of inquiry.
Participation in the research will involve 10 minutes or less of th

The research falls into one of six categories of research activity described in the regulations.

According to federal regulations, the expedited review process may be used when the study procedures pose:
No more than minimal risk and the research activities fall within regulatory categories identified as eligible.
A minor increase over minimal risk a

No more than minimal risk and the research activities fall within regulatory categories identified as eligible.

Which of the following statements about the relationship between an institution and the institution's IRB(s) is correct?
Institutional priorities take precedence over all IRB determinations.
Department chairs can overturn an IRB disapproval.
Officials of

Officials of the institution may overrule an IRB approval.

Continuing review of an approved and ongoing protocol
Must be conducted by a convened IRB.
Is limited to review of unanticipated problems.
Must occur within 12 months of the approval date.
Is not required unless additional risks have been identified.

Must occur within 12 months of the approval date.

Identify the example of when situation and time are key to assessing risk of harm in a research study:
A study on the efficacy of a behavioral intervention for smoking cessation involves both adults and teenagers
Asking women if they have had an abortion

Asking women if they have had an abortion

Risk of harm in social and behavioral sciences generally fall in three categories, which are:
Breach of confidentiality, loss of autonomy, and study procedures
Study procedures, breach of confidentiality, and loss of employment
Invasion of privacy, advers

Invasion of privacy, breach of confidentiality, and study procedures

What statement about risks in social and behavioral sciences research is most accurate:
Anonymizing data effectively manages the risk of creating emotional distress.
Risks are specific to time, situation, and culture.
There are never any risks.
If a study

Risks are specific to time, situation, and culture.

The primary purpose of a Certificate of Confidentiality is to:
Allow law enforcement to investigate abuse cases.
Protect researchers from disclosing conflicts of interest.
Prevent subjects from knowing the purpose of a study.
Protect identifiable research

Protect identifiable research information from compelled disclosure.

A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use. Direct identifiers will not be collected; however, IP addresses may be present in the data set. Risk of harm should be evaluat

Both the magnitude (or severity) and the probability (or likelihood) of harm.

A therapist at a free university clinic treats elementary school children with behavior problems who are referred by a social service agency. She is also a doctoral candidate who proposes using data she has and will collect about the children for a case-b

The parents of the children might feel pressure to give permission to the therapist to use their children's data so that she will continue to provide services to their children.

A general requirement for informed consent is that no informed consent may include any exculpatory language. Exculpatory language is that which waives or appears to waive any of the subject's legal rights or releases or appears to release those conducting

Taking part in the research is voluntary, but if you choose to take part, you waive the right to legal redress for any research-related injuries.

A criterion for waiving informed consent is that, when appropriate, subjects are provided additional pertinent information after the study. In which of the following studies would it NOT be appropriate to provide subjects with information about missing el

A study in which subjects were assigned to study activities based on an undesirable or unflattering physical characteristic as assessed by members of the research team.

A waiver of the requirement for documentation of informed consent may be granted when:
The investigator has no convenient place to store signed consent forms separate from the research data
The only record linking the subject and the research is the conse

The only record linking the subject and the research is the consent document and the principal risk is a breach of confidentiality.

As part of the consent process, the federal regulations require researchers to:
Provide potential subjects with information at the appropriate reading comprehension level.
Recommend that potential subjects discuss their decision to participate with family

Provide potential subjects with information at the appropriate reading comprehension level.

Data are made anonymous by:
Reporting data in aggregate form in publications resulting from the research.
Requiring all members of the research team to sign confidentiality agreements.
Keeping the key linking names to responses in a secure location.
Destr

Destroying all identifiers connected to the data.

A researcher leaves a research file in her car while she attends a concert and her car is stolen. The file contains charts of aggregated numerical data from a research study with human subjects, but no other documents. The consent form said that no identi

There was neither a violation of privacy nor a breach of confidentiality.

Which of the following constitutes both a breach of confidentiality (the research data have been disclosed, counter to the agreement between researcher and subjects) and a violation of subjects' privacy (the right of the individuals to be protected agains

A faculty member makes identifiable data about sexual behavior available to graduate students, although the subjects were assured that the data would be de-identified.

In a longitudinal study that will follow children from kindergarten through high school and will collect information about illegal activities, which of the following confidentiality procedures would protect against compelled disclosure of individually ide

Securing a Certificate of Confidentiality.

When a focus group deals with a potentially sensitive topic, which of the following statements about providing confidentiality to focus group participants is correct?
The researcher cannot control what participants repeat about others outside the group.
U

The researcher cannot control what participants repeat about others outside the group.

A researcher is studying women recently admitted to a state prison. All potential subjects must have children under the age of five. Research subjects will be given a basket of toys to use at their children's first visit that the children can then take ho

Not an excessive incentive.

A sociologist wants to study a culture that occurs in some women's prisons: "state families," in which individual prisoners take on certain roles within a group of like-minded prisoners. There is previous evidence that younger prisoners will use older inm

Wrong and is prohibited; subject selection needs to be free from intervention by prison authorities or prisoners.

A graduate student wants to examine the effect of print media versus televised media on individuals' position on several social issues. The superintendent of a local work release facility, a family friend, will allow the graduate student access to the pri

Not approve this project because the prisoners are merely a population of convenience for the student.

Which example of research with prisoners would be allowable under the regulations?
Examining age at first arrest as a predictor of adult criminal history.
Examining the use of financial incentives to improve compliance with dentist appointments.
Investiga

Examining age at first arrest as a predictor of adult criminal history.

A researcher wants to contact former prisoners who are now on parole. She wants to study the difficulty of getting employment based on whether the subjects had been convicted of felony versus misdemeanor crimes. She needs to:
Do nothing in regards the Sub

Do nothing in regards the Subpart C since the research does not meet the criteria for prison research: individuals on parole are not considered prisoners. The definition applies to both minors and adults.

A researcher is examining the quality of life for prisoners who are HIV positive using surveys followed by interview. The IRB must ensure that:
All prisoners receive HIV testing.
A medical doctor serves as co-investigator.
The survey instrument is standar

Confidentiality of the prisoners' health status is maintained.

A researcher's study uses a dataset of prisoner demographic characteristics. This dataset includes criminal history data that predates incarceration and includes data on disciplinary behavior while in prison. There is no interaction with prisoners. The re

Is wrong. 45 CFR 46.101(b) states that research conducted in prisons may not be exempt.

A researcher wants to observe preschoolers at a local public playground to evaluate levels of cooperation. The researcher will not interact with the children. This research would be eligible for which type of IRB review?
This research would not require IR

This research would not require IRB review because it would be eligible for exemption since the researcher is not interacting with the children and the playground is a public setting.

Which of the following statements most accurately describes the requirement for the documentation of minors' assent to participate in research?
Parents must approve written documentation.
Documentation is required unless waived by an IRB.
To protect minor

Federal regulations do not require the documentation of minors' assent.

A researcher asks an IRB to waive the requirement for parental permission for a study conducted in schools because the nature of the research requires participation of all the children present in classrooms on the day the research will take place. Assumin

The research must pose no more than minimal risk.

The specific Department of Health and Human Services (HHS) Regulations that apply to research with children are known as:
Subpart B: Additional Protections for Children Involved as Subjects in Research
Subpart A: The Common Rule
Subpart D: Additional Prot

Subpart D: Additional Protections for Children Involved as Subjects in Research

According to federal regulations, "children" are defined as:
Persons who have not yet attained the legal age of consent under the applicable laws in the jurisdiction in which the research was approved.
Persons who are under 18 years of age.
Persons who ha

Persons who have not yet attained the legal age of consent under the applicable laws in the jurisdiction in which the research will be conducted.

A study that involves interviews of adults is eligible for expedited review. The researcher wants to add an adolescent population (aged 12 to 17) to the study and has designed a parental permission and assent process. No additional changes are planned. Wh

Unless the nature of the questions would raise the level of risk to more than minimal for adolescents, the research would still qualify for expedited review.

According to Subpart D, research with children may be eligible for exemption when:
The children will be asked to complete a survey
The research involves the use of educational tests
The children will be interviewed by the researcher.
The research with chi

The research involves the use of educational tests

The provisions of Subpart D, of the HHS regulations, Additional Protections for Children Involved as Subjects in Research apply to:
All research involving children
All research that is more than minimal risk
All research funded by any federal agency
All r

All research funded by HHS

The procedures for reporting potential unanticipated problems involving risk to subjects or others to the IRB are:
Stated in the human subject protection regulations, but not in the drug or device regulations
Included in the consent process
Determined by

Determined by the institution in its written policies and procedures

A researcher conducts a focus group to learn about attitudes towards hygiene and disease prevention. Two weeks after the focus group, the researcher learns one of the subjects had a heart attack at home and was hospitalized, but made a full recovery. Base

No, this does not need to be reported since it is unrelated to participation in the study.

A researcher conducting behavioral research collects individually identifiable sensitive information about illicit drug use and other illegal behaviors by surveying college students. One of the subjects is in an automobile accident two weeks after partici

No, this does not need to be reported because it was assessed by the researcher as unrelated to the research study.

Researchers must report potential unanticipated problems that involve risks to others directly to:
Institutional Risk Manager
American Psychological Association
HIPAA Compliance Officer
Institutional Review Board (IRB)

Institutional Review Board (IRB)

A researcher conducting behavioral research collects individually identifiable sensitive information about illicit drug use and other illegal behaviors by surveying college students. The data are stored on a laptop computer without encryption, and the lap

Promptly

According to OHRP, a problem is an "unanticipated problem" when it meets which of the following criteria:
Unexpected, related or possibly related to the research, suggests that the research does not put the subjects or others at greater risk
Unexpected, r

Unexpected, related or possible related to the research, suggests the research puts subjects or others at greater risk

Researchers must report potential unanticipated problems that involve risks to others directly to:
Institutional Risk Manager
American Psychological Association
HIPAA Compliance Officer
Institutional Review Board (IRB)

...