Modules

25 August 2022
4.7 (114 reviews)
53 test answers

Unlock all answers in this set

Unlock answers (49)
question
The COI management plan aims to:
answer
Provide procedures or extras steps to be taken to minimize the risk of bias when a COI is disclosed
question
During an Institutional Review Board (IRB) meeting, any IRB member who may have a potential COI with a study under review should:
answer
Disclose their potential COI and may answer questions, but recuse themselves from voting
question
A researcher's membership on an advisory board with an organization sponsoring research can create a COI because:
answer
It may be difficult for the researcher to appear neutral, as the researcher may have an interest in the research's success
question
An example of an individual financial COI is:
answer
A researcher's wife holds equity in a publicly traded pharmaceutical company that is also the sponsor of the researcher's study.
question
The PHS regulations about financial conflict of interests require which party to disclose significant financial conflicts of interest?
answer
Researcher
question
A researcher calls you stating that he plans to submit a proposal to the NIH for a human subjects research study. He wants to know at what point he and his study team must submit COI disclosures to comply with the PHS regulation.
answer
No later than the time of proposal submission
question
The FDA regulations governing disclosure of individual COIs require:
answer
Applicants submitting marketing applications to disclose financial COIs of researchers who conducted clinical studies
question
An example of an institutional COI is:
answer
An industry sponsor pays for the construction of a new research laboratory at the organization
question
According to the Belmont Report, the moral requirement that there be fair outcomes in the selection of research subjects, expresses the principle of:
answer
Justice
question
The Belmont principle of beneficence requires that:
answer
Potential benefits justify the risks of harm
question
The researcher's failure to protect research subjects from deductive disclosure is the primary ethical violation in which of the following studies?
answer
Harvard "Tastes, Ties, and Time (T3)" study (2006-2009)" study
question
Which of the following is an example of how the principle of beneficence is applied to a study involving human subjects?
answer
Ensuring that risks are reasonable in relationship to anticipated benefits.
question
Humphreys collecting data for the Tearoom Trade study under the pretense that he was a lookout is an example of a violation of the principle of:
answer
Respect for persons.
question
Census data (the final report as published by the Census Bureau) is an example of:
answer
Public information.
question
According to the federal regulations, human subjects are living human beings about whom an investigator obtains data through interaction or intervention with the individual or:
answer
Identifiable private information.
question
According to the federal regulations, which of the following studies meets the definition of research with human subjects?
answer
An experiment is proposed on the relationship between gender-related stereotypes in math and the subsequent performance by males and females on math tests.
question
According to the federal regulations, which of the following studies meets the definition of research with human subjects?
answer
A developmental psychologist videotapes interactions between groups of toddlers and their care givers to determine which intervention methods most effectively manage aggression.
question
According to the federal regulations, which of the following studies meets the definition of research with human subjects?
answer
A study of twenty 4th grade classrooms in which researchers ask the schools to systematically vary the time of day reading is taught, and collect weekly assessments of reading comprehension for each child over a three-month period.
question
According to the federal regulations, which of the following studies meets the definition of research with human subjects?
answer
A cognitive psychologist enrolls undergraduate students for a computer-based study about the effect of mood on problem solving behaviors.
question
According to federal regulations, the expedited review process may be used when the study procedures pose:
answer
No more than minimal risk and the research activities fall within regulatory categories identified as eligible.
question
Continuing review of an approved and ongoing protocol
answer
Must occur within 12 months of the approval date.
question
In addition to pregnant women, fetuses, and neonates, another subpart of the HHS regulations provides additional protections for which of the following vulnerable populations?
answer
Prisoners
question
Which of the following statements about the relationship between an institution and the institution's IRB(s) is correct?
answer
Officials of the institution may overrule an IRB approval.
question
According to the federal regulations, research is eligible for exemption, if
answer
The research falls into one of six categories of research activity described in the regulations.
question
If disclosure of a subject's involvement in a specific research study can be potentially harmful to the subject, and the consent form is the only record linking the subject to the research, which of the following would be most helpful:
answer
Obtain a waiver of documentation of informed consent.
question
The primary purpose of a Certificate of Confidentiality is to:
answer
Protect identifiable research information from compelled disclosure.
question
Identify the example of when situation and time are key to assessing risk of harm in a research study:
answer
Asking women if they have had an abortion
question
A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use. Direct identifiers will not be collected; however, IP addresses may be present in the data set. Risk of harm should be evaluated by:
answer
Both the magnitude (or severity) and the probability (or likelihood) of harm.
question
A researcher wishes to study generational differences in coping mechanisms among adults who experienced abuse as children. Adequate measures will be instituted to obtain informed consent and ensure that there is no breach of confidentiality. The most likely additional risk is that some subjects may:
answer
Experience emotional or psychological distress.
question
Additional safeguards that may be included in a social and behavioral study may include:
answer
Remove all direct identifiers from the data as soon as possible.
question
Risk of harm in social and behavioral sciences generally fall in three categories, which are:
answer
Invasion of privacy, breach of confidentiality, and study procedures
question
A therapist at a free university clinic treats elementary school children with behavior problems who are referred by a social service agency. She is also a doctoral candidate who proposes using data she has and will collect about the children for a case-based research project. Which of the following statements about parental permission is correct?
answer
The parents of the children might feel pressure to give permission to the therapist to use their children's data so that she will continue to provide services to their children.
question
A general requirement for informed consent is that no informed consent may include any exculpatory language. Exculpatory language is that which waives or appears to waive any of the subject's legal rights or releases or appears to release those conducting the research from liability for negligence. Which of the following statements in a consent form is an example of exculpatory language?
answer
Taking part in the research is voluntary, but if you choose to take part, you waive the right to legal redress for any research-related injuries.
question
A criterion for waiving informed consent is that, when appropriate, subjects are provided additional pertinent information after the study. In which of the following studies would it NOT be appropriate to provide subjects with information about missing elements of consent:
answer
A study in which subjects were assigned to study activities based on an undesirable or unflattering physical characteristic as assessed by members of the research team.
question
A waiver of the requirement for documentation of informed consent may be granted when:
answer
The only record linking the subject and the research is the consent document and the principal risk is a breach of confidentiality.
question
As part of the consent process, the federal regulations require researchers to:
answer
Provide potential subjects with information at the appropriate reading comprehension level.
question
Data are made anonymous by
answer
Destroying all identifiers connected to the data.
question
Which of the following constitutes both a breach of confidentiality (the research data have been disclosed, counter to the agreement between researcher and subjects) and a violation of subjects' privacy (the right of the individuals to be protected against intrusion into their personal lives or affairs)?
answer
A faculty member makes identifiable data about sexual behavior available to graduate students, although the subjects were assured that the data would be de-identified.
question
In a longitudinal study that will follow children from kindergarten through high school and will collect information about illegal activities, which of the following confidentiality procedures would protect against compelled disclosure of individually identifiable information?
answer
Securing a Certificate of Confidentiality.
question
When a focus group deals with a potentially sensitive topic, which of the following statements about providing confidentiality to focus group participants is correct?
answer
The researcher cannot control what participants repeat about others outside the group.
question
A researcher leaves a research file in her car while she attends a concert and her car is stolen. The file contains charts of aggregated numerical data from a research study with human subjects, but no other documents. The consent form said that no identifying information would be retained, and the researcher adhered to that component. Which of the following statements best characterizes what occurred?
answer
There was neither a violation of privacy nor a breach of confidentiality.
question
Researchers must report potential unanticipated problems that involve risks to others directly to:
answer
Institutional Review Board (IRB)
question
According to OHRP, a problem is an "unanticipated problem" when it meets which of the following criteria:
answer
Unexpected, related or possible related to the research, suggests the research puts subjects or others at greater risk
question
The procedures for reporting potential unanticipated problems involving risk to subjects or others to the IRB are:
answer
Determined by the institution in its written policies and procedures
question
A researcher conducts a focus group to learn about attitudes towards hygiene and disease prevention. Two weeks after the focus group, the researcher learns one of the subjects had a heart attack at home and was hospitalized, but made a full recovery. Based on DHHS regulations, should the researcher report this event to the IRB?
answer
No, this does not need to be reported since it is unrelated to participation in the study.
question
A researcher conducting behavioral research collects individually identifiable sensitive information about illicit drug use and other illegal behaviors by surveying college students. One of the subjects is in an automobile accident two weeks after participating in the research study. Is this an example of an unanticipated problem that requires reporting to the IRB?
answer
No, this does not need to be reported because it was assessed by the researcher as unrelated to the research study.
question
NBAC proposed a concept of vulnerability in research based on features of potential subjects or of their situation. Which of the following was NOT included as possibly leading to vulnerability?
answer
High potential for individual benefit from participating in research
question
Which is true of inducements in research?
answer
Inducements constitute an "undue influence" if they alter a potential subject's decision-making processes, such that they do not appropriately weigh the risk-benefit relationship of the research.
question
Subjects with a serious illness may be at risk for exploitation since they may be desperate for a possible cure. This is an example of
answer
Medical Vulnerability
question
Identify the following groups that are protected in the federal regulations (45 CFR 46), specifically in Subparts B, C, and D with additional protections:
answer
Pregnant women, prisoners, children
question
A subject participates in a drug study because treatment is available at no or reduced cost, and he could not otherwise afford it. This is an example of
answer
Economic vulnerability
question
Which is an example of a situation where deferential vulnerability might be a factor?
answer
A physician recruiting his patients
question
In considering NBAC's analytic approach, an otherwise competent person who is acutely ill might be considered at especially high risk of harm for:
answer
Situational cognitive vulnerability