CITI Training Responsible Conduct

20 August 2022
4.7 (114 reviews)
47 test answers

Unlock all answers in this set

Unlock answers (43)
question
Which of the following is true regarding research misconduct?
answer
Federal funding agencies typically rely on an institution to make the initial response to an allegation of research misconduct.
question
According to the U.S. Federal Research Misconduct Policy, fabrication involves:
answer
Fabrication involves making up data or results, recording the data in a permanent record, sharing fake data informally or in a written report.
question
According to the U.S. Federal Research Misconduct Policy, falsification involves:
answer
Falsification involves purposefully manipulating research materials, equipment, or processes, or changing or omitting data or results such that the research is not accurately represented in the research record.
question
Which of the following is the most effective strategy for preventing research misconduct?
answer
Among the options mentioned, good mentoring is the most effective strategy for preventing research misconduct.
question
Which of the following is true regarding the U.S. Federal Research Misconduct Policy?
answer
To have a misconduct finding, the action must have been committed intentionally, knowingly, or recklessly.
question
Which type of research misconduct most likely occurred if someone intentionally removes data points from the data set in order to generate a deceptive conclusion?
answer
Falsification
question
Which of the following most accurately describes the practice of ghost authorship?
answer
It is a situation where the individual who wrote the manuscript is not listed as an author.
question
The two main criteria that the National Science Foundation (NSF) uses to evaluate grant proposals are:
answer
The two main criteria used by NSF to evaluate a grant proposal are the intellectual merit and broader impacts of the proposal.
question
Which of the following is true about the management of conflicts of interest?
answer
Management plans are often created to reduce the impact of conflicts of interest. Organizations often create management plans to reduce the impact of conflicts of interest rather than completely eliminating them. However, in some cases, it will be necessary to eliminate a conflict of interest.
question
The Belmont Report's principle of respect for persons incorporates at least two ethical convictions: first, that individuals should be treated as autonomous agents, and second, that:
answer
Persons with diminished autonomy are entitled to protection.
question
Which of the following are the three principles discussed in the Belmont Report?
answer
Respect for Persons, Beneficence, Justice
question
Informed consent is considered an application of which Belmont principle?
answer
Respect for Persons
question
Issued in 1974, 45 CFR 46 raised to regulatory status:
answer
45 CFR 46 raised to regulatory status the US Public Health Service policy of 1966 "Clinical research and investigation involving human beings".
question
Which of the following is included in the Nuremberg Code:
answer
The Nuremberg Code included the requirement of the voluntary consent of subjects. While all of the choices are valid ethical concerns, none of the other choices were included in the Nuremberg Code.
question
Which of the following brought increased public attention to the problems with the IRB system?
answer
Although all of these are related to the problems with the IRB system, the death of a research subject (Jesse Gelsinger) was what received public attention.
question
The National Research Act of 1974
answer
The National Research Act of 1974 established the National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. The identification of guidelines, ethical principles and regulations came as a result of the deliberations of the National Commission.
question
Census data (the final report as published by the Census Bureau) is an example of:
answer
public information
question
According to the federal regulations, which of the following studies meets the definition of research with human subjects?
answer
A study of twenty 4th grade classrooms in which researchers ask the schools to systematically vary the time of day reading is taught, and collect weekly assessments of reading comprehension for each child over a three-month period.
question
According to the federal regulations, which of the following studies meets the definition of research with human subjects?
answer
An experiment is proposed on the relationship between gender-related stereotypes in math and the subsequent performance by males and females on math tests.
question
According to the federal regulations, research is eligible for exemption, if:
answer
Research is only eligible for exemption if all the activities associated with the research fall into one of eight categories of activities described in the federal regulations. The regulations do allow some research with children to be exempt (although institutional policy may not). The duration of the study and the experience of the researcher are not criteria for determining eligibility for exemption.
question
A subject in a clinical research trial experiences a serious, unanticipated adverse drug experience. How should the investigator proceed, with respect to the IRB, after the discovery of the adverse event occurrence?
answer
Report the adverse drug experience in a timely manner, in keeping with the IRB's policies and procedures, using the forms or the mechanism provided by the IRB. Comment The most appropriate action for the investigator to take is to report the adverse drug experience in a timely manner using the forms provided by the institution.
question
How long is an investigator required to keep consent documents, IRB correspondence, and research records?
answer
For a minimum of three years after completion of the study
question
According to federal regulations, which of the following best describes when expedited review of a new, proposed study may be used by the IRB?
answer
The study involves no more than minimal risk and meets one of the allowable categories of expedited review specified in federal regulations
question
IRB continuing review of a greater than minimal risk approved protocol that is currently enrolling subjects must:
answer
Occur at least annually.
question
Identify the example of when situation and time are key to assessing risk of harm in a research study:
answer
Asking women if they have had an abortion
question
What statement about risks in social and behavioral sciences research is most accurate:
answer
Risks are specific to time, situation, and culture.
question
The primary purpose of a Certificate of Confidentiality is to:
answer
Protect identifiable research information from compelled disclosure.
question
Risk of harm in social and behavioral sciences generally fall in three categories, which are:
answer
Invasion of privacy, breach of confidentiality, and study procedures
question
If disclosure of a subject's involvement in a specific research study can be potentially harmful to the subject, and the consent form is the only record linking the subject to the research, which of the following would be most helpful:
answer
If the only identifier collected in the course of a study would be the signature on the consent document and the principal source of harm would be a breach of confidentiality disclosing one's participation in the study, a waiver of documentation of informed consent should be sought. With such a waiver, the informed consent process could be conducted verbally with no written evidence of the subject's participation in the research.
question
A general requirement for informed consent is that no informed consent may include any exculpatory language. Exculpatory language is that which waives or appears to waive any of the subject's legal rights or releases or appears to release those conducting the research from liability for negligence. Which of the following statements in a consent form is an example of exculpatory language?
answer
Taking part in the research is voluntary, but if you choose to take part, you waive the right to legal redress for any research-related injuries
question
As part of the consent process, the federal regulations require researchers to:
answer
Provide potential subjects with information at the appropriate reading comprehension level.
question
A researcher leaves a research file in her car while she attends a concert and her car is stolen. The file contains charts of aggregated numerical data from a research study with human subjects, but no other documents. The consent form said that no identifying information would be retained, and the researcher adhered to that component. Which of the following statements best characterizes what occurred?
answer
There was neither a violation of privacy nor a breach of confidentiality
question
Which of the following constitutes both a breach of confidentiality (the research data have been disclosed, counter to the agreement between researcher and subjects) and a violation of subjects' privacy (the right of the individuals to be protected against intrusion into their personal lives or affairs)?
answer
A faculty member makes identifiable data about sexual behavior available to graduate students, although the subjects were assured that the data would be de-identified.
question
In a longitudinal study that will follow children from kindergarten through high school and will collect information about illegal activities, which of the following confidentiality procedures would protect against compelled disclosure of individually identifiable information?
answer
Although data encryption, using pseudonyms, and waiving documentation of consent, provide data protection, the researcher can link individuals to their responses. Therefore, the data are vulnerable to subpoena in civil, criminal, and administrative court proceedings. Unless the researcher has a Certificate of Confidentiality, he or she may be compelled to release individually identifiable information about research subjects. The Certificate provides the highest level of protection.
question
When an IRB is reviewing a research study and they are considering if a potential subject population is vulnerable, they should consider:
answer
Is there a power differential between researchers and subjects?
question
A subject participates in a drug study because treatment is available at no or reduced cost, and he could not otherwise afford it. This is an example of:
answer
Economic vulnerability
question
In considering NBAC's analytic approach, an otherwise competent person who is acutely ill might be considered at especially high risk of harm for:
answer
Situational cognitive vulnerability
question
According to the authors, there are four common abuses that historically are described as giving rise to vulnerability. Which response below contains the correct four?
answer
Physical control, coercion, undue influence, and manipulation Comment There are four common abuses that historically are described as giving rise to vulnerability 1) physical control, 2) coercion, 3) undue influence, and 4) manipulation. These exist along a continuum of severity with physical control being the most severe and undue influence and manipulation being the least (Nelson and Merz 2002, V69-80). The other abuses- prejudice, neglect, and disrespect - should still be avoided in research.
question
When required, the information provided to the data subject in a HIPAA disclosure accounting ...
answer
must be more detailed for disclosures that involve fewer than 50 subject records.
question
HIPAA protects a category of information known as protected health information (PHI). PHI covered under HIPAA include
answer
Identifiable health information that is created or held by covered entities and their business associates.
question
Recruiting into research ...
answer
Can qualify as an activity "preparatory to research," at least for the initial contact, but data should not leave the covered entity. Comment It is still permissible under HIPAA to discuss recruitment into research with patients for whom such involvement might be appropriate. This common practice is considered to fall within the definition of treatment, at least when the conversation is undertaken by one of the patient's healthcare providers. If the contact will be made by someone other than the patient's healthcare provider, permission will be required.
question
A covered entity may use or disclose PHI without an authorization, or documentation of a waiver or an alteration of authorization, for all of the following EXCEPT:
answer
Data that does not cross state lines when disclosed by the covered entity.
question
The HIPAA "minimum necessary" standard applies...
answer
To all human subjects research that uses PHI without an authorization from the data subject.
question
If you're unsure about the particulars of HIPAA research requirements at your organization or have questions, you can usually consult with:
answer
An organizational IRB or Privacy Board, privacy official ("Privacy Officer"), or security official ("Security Officer"), depending on the issue.
question
HIPAA's protections for health information used for research purposes...
answer
Supplement those of the Common Rule and FDA.
question
Under HIPAA, a "disclosure accounting" is required:
answer
For all human subjects research that uses PHI without an authorization from the data subject, except for limited data sets.
question
Under HIPAA, "retrospective research" (a.k.a., data mining) on collections of PHI generally ...
answer
Is research, and so requires either an authorization or meeting one of the criteria for a waiver of authorization.