Questions and Answers 2024
A researcher leaves a research file in her car while she attends a concert and her car is
stolen. The file contains charts of aggregated numerical data from a research study with
human subjects, but no other documents. The consent form said that no identifying
information would be retained, and the researcher adhered to that component. Which of
the following statements best characterizes what occurred? - answer There was
neither a violation of privacy nor a breach of confidentiality.
Which of the following constitutes both a breach of confidentiality (the research data
have been disclosed, counter to the agreement between researcher and subjects) and a
violation of subjects' privacy (the right of the individuals to be protected against intrusion
into their personal lives or affairs)? - answer A faculty member makes identifiable
data about sexual behavior available to graduate students, although the subjects were
assured that the data would be de-identified.
In a longitudinal study that will follow children from kindergarten through high school and
will collect information about illegal activities, which of the following confidentiality
procedures would protect against compelled disclosure of individually identifiable
information? - answer Securing a Certificate of Confidentiality
When a focus group deals with a potentially sensitive topic, which of the following
statements about providing confidentiality to focus group participants is correct? -
answer The researcher cannot control what participants repeat about others outside
the group.
Data are made anonymous by - answer Destroying all identifiers connected to the
data.Powered by TCPDF (www.tcpdf.org)
1 / 1