CITI Exam Modules 4-6 Exam questions
with Answers
Risks of harm in social and behavioral sciences generally fall into three
categories - -1) Invasion of privacy, 2) Breach of confidentiality, 3) Study
procedures
-Two factors that must be considered in relation to each other when
assessing risk - -Probability and magnitude of harm AS well as population
context
-Why is independent assessment of risk is critical? - -B/c researchers are
biased toward downplaying (and believing it) risks, and up-playing benefits
-How can researchers safeguard data from unauthorized access? - -1)
Remove all direct identifiers as soon as possible. 2) Substitute codes for
identifiers. 3) Maintain code lists and data files in separate secure locations.
4) Use accepted methods to protect against indirect identification, such as
aggregate reporting or pseudonyms.
5) Use and protect computer passwords. 6) Encrypt transmitted and stored
data. 7) Access and store data on computers without Internet connections. 8)
Obtain a Certificate of Confidentiality.
-Certificate of Confidentiality fact - -The NIH issues Certificates of
Confidentiality automatically for NIH funded (wholly, or in part) grants.
-Low-risk, common social and behavioral sciences methodologies: - -
Surveys, questionnaires, and interviews
-(LAR) - -A subject's legally authorized representative
-The two parts to informed consent - -1) The process of providing
information to prospective subjects. 2) The documentation that the process
took place and is a record of the subjects' agreement to take part in the
study.
-Exception to informed consent - -In some cases, an oral consent process
without documentation may be approved by an Institutional Review Board
(IRB). Documentation also may be by audio or video recording as approved
by an IRB.
-The Informed Consent process - -A process that begins with the
recruitment and screening of a subject and continues throughout the
subject's involvement in the research.
with Answers
Risks of harm in social and behavioral sciences generally fall into three
categories - -1) Invasion of privacy, 2) Breach of confidentiality, 3) Study
procedures
-Two factors that must be considered in relation to each other when
assessing risk - -Probability and magnitude of harm AS well as population
context
-Why is independent assessment of risk is critical? - -B/c researchers are
biased toward downplaying (and believing it) risks, and up-playing benefits
-How can researchers safeguard data from unauthorized access? - -1)
Remove all direct identifiers as soon as possible. 2) Substitute codes for
identifiers. 3) Maintain code lists and data files in separate secure locations.
4) Use accepted methods to protect against indirect identification, such as
aggregate reporting or pseudonyms.
5) Use and protect computer passwords. 6) Encrypt transmitted and stored
data. 7) Access and store data on computers without Internet connections. 8)
Obtain a Certificate of Confidentiality.
-Certificate of Confidentiality fact - -The NIH issues Certificates of
Confidentiality automatically for NIH funded (wholly, or in part) grants.
-Low-risk, common social and behavioral sciences methodologies: - -
Surveys, questionnaires, and interviews
-(LAR) - -A subject's legally authorized representative
-The two parts to informed consent - -1) The process of providing
information to prospective subjects. 2) The documentation that the process
took place and is a record of the subjects' agreement to take part in the
study.
-Exception to informed consent - -In some cases, an oral consent process
without documentation may be approved by an Institutional Review Board
(IRB). Documentation also may be by audio or video recording as approved
by an IRB.
-The Informed Consent process - -A process that begins with the
recruitment and screening of a subject and continues throughout the
subject's involvement in the research.