CITI Module Questions and Answers with Complete Solutions
CITI Module Questions and Answers with Complete Solutions what type of inappropriate practice most likely occurred if a researcher takes credit for someone else's idea and does not acknowledge the original source plagiarism which of the following is considered to be research misconduct: conflict of interest harassing a co-worker plagiarism gift authorship plagiarism the typical first main phase in response to a research misconduct allegation is called the inquiry after the inquiry if there is sufficient evidence to proceed, what is the next main phase that takes place in response to a research misconduct allegation an investigation which of the following is true regarding research misconduct: a central federal agency handles all cases of research misconduct funding agencies normally perform their own misconduct inquiry before the institution becomes involved the US government is required to reveal publicly the identity of any person who commits misconduct federal funding agencies typically rely on an institution to make the initial response to an allegation of research misconduct federal funding agencies typically rely on an institution to make the initial response to an allegation of research misconduct Which of the following most accurately describes data lifecycle management (DLM)? It refers to the tools and processes for handling data during a research study and after it concludes. It refers to the obligation to share data imposed by professional journals. It refers to the obligation to uphold data confidentiality imposed by federal law. It refers to the data collection requirements of a particular organization. It refers to the tools and processes for handling data during a research study and after it concludes. Which of the following is true regarding data sharing and stewardship? Researchers who receive federal funding may have to adhere to a data sharing requirement. Researchers are obligated to share their data prior to a study's completion. Researchers are exempt from any national security requirements with respect to data sharing. Researchers are no longer obligated to manage data after a study concludes. Researchers who receive federal funding may have to adhere to a data sharing requirement. Which of the following is true regarding data acquisition? Because data acquisition is often technical, the research team does not need to be involved and it can be outsourced to external professionals. Data acquisition should follow a detailed collection plan that is set in advance. Existing data sets from other researchers can be used without restriction. A data acquisition plan is not needed because the process can be very flexible to accommodate changes that occur as the research unfolds. Data acquisition should follow a detailed collection plan that is set in advance. Which of the following is most likely to own the data resulting from a research project? A faculty member working on a federally-funded project. A graduate student working under the direction of a faculty member. A technician who collected the data. The organization that receives federal funding for a project. The organization that receives federal funding for a project. What are the three main goals of data lifecycle management (DLM)? Confidentiality, availability, and integrity Which of the following is true regarding authors who seek to publish the same content in multiple papers? The research record is not affected by an author who publishes the same work multiple times. Using the same content in multiple papers is deceptive if it is not properly disclosed to journal editors or other relevant entities. Journal editors do not require authors to obtain permission for reusing the same content. Authors are never allowed to publish the same content multiple times. Using the same content in multiple papers is deceptive if it is not properly disclosed to journal editors or other relevant entities. Which of the following statements is true regarding authorship practices? In scientific fields, authors have to be listed in alphabetical order. Different disciplines have different practices
Written for
- Institution
- CITI Module
- Course
- CITI Module
Document information
- Uploaded on
- August 29, 2022
- Number of pages
- 38
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
citi module questions and answers with complete solutions
-
what type of inappropriate practice most likely occurred if a researcher takes credit for someone elses idea and does not acknowledge the
Also available in package deal