Chapter 5
1. Based on what we know from this chapter, the Tuskegee Syphilis Study violated which
of the following? Select all that apply.
A) Freedom from harm
B) Right to self-determination
C) Right to fair treatment
D) Privacy rule
2. The regulations affecting the ethical conduct of research sponsored by the U.S. federal
government were based on which of the following?
A) Nuremberg Code
m
B) Declaration of Helsinki
C) Belmont Report
co
D) Code of Ethics of the American Nurses Association
.
ep
3. Debriefing sessions are which of the following?
A) Discussions with prospective participants to obtain informed consent
pr
B) Discussions with participants after a study to explain various aspects of the study
and provide a forum for questioning
st
C) Discussions with a human subjects committee before a study to obtain permission
to proceed
te
D) Recruitment discussions with prospective participants
ng
4. Which of the following are potential benefits from participating in a study? Select all
si
that apply.
ur
A) Monetary gains
B) Access to a new and potentially beneficial treatment
yn
C) Opportunity to discuss personal feelings and experiences with an objective listener
D) Opportunity to help determine the research question that the study is based on
.m
w
5. Which of the following comprise the three primary ethical principles articulated by the
Belmont Report? Select all that apply.
w
A) Beneficence
w
B) Respect for human dignity
C) Anonymity
D) Justice
Page 1
, 6. If a researcher unobtrusively studies interactions among patients in a psychiatric
hospital, what might this be called?
A) Research misconduct
B) Breach of confidentiality
C) Covert data collection
D) Deception
7. The safeguard mechanism by which even the researcher cannot link the participant with
the information provided is called which of the following?
A) Confidentiality
m
B) Anonymity
C) Informed consent
co
D) Right to privacy
.
ep
8. Confidentiality of study participants can be most effectively protected by which of the
following?
pr
A) Avoiding the collection of any identifying information
B) Performing a risk/benefit assessment
st
C) Placing all identifying information on computer files rather than manual files
D) Obtaining informed consent from participants before the study
te
ng
9. Vulnerable study participants would include which of the following?
A) Women hospitalized for a mastectomy
si
B) Members of a senior citizens group
ur
C) People who do not speak English
D) Pediatric patients
yn
.m
10. In what situation is informed consent not needed?
A) The researcher pays the participants a stipend
w
B) The risk/benefit ratio is low
C) A Certificate of Confidentiality has been obtained
w
D) Informed consent is always needed
w
11. In a qualitative study that involves multiple contacts between the researcher and study
participants, the researcher may negotiate which of the following?
A) Implied consent
B) Stipend
C) Process consent
D) Risk/benefit ratio
Page 2
1. Based on what we know from this chapter, the Tuskegee Syphilis Study violated which
of the following? Select all that apply.
A) Freedom from harm
B) Right to self-determination
C) Right to fair treatment
D) Privacy rule
2. The regulations affecting the ethical conduct of research sponsored by the U.S. federal
government were based on which of the following?
A) Nuremberg Code
m
B) Declaration of Helsinki
C) Belmont Report
co
D) Code of Ethics of the American Nurses Association
.
ep
3. Debriefing sessions are which of the following?
A) Discussions with prospective participants to obtain informed consent
pr
B) Discussions with participants after a study to explain various aspects of the study
and provide a forum for questioning
st
C) Discussions with a human subjects committee before a study to obtain permission
to proceed
te
D) Recruitment discussions with prospective participants
ng
4. Which of the following are potential benefits from participating in a study? Select all
si
that apply.
ur
A) Monetary gains
B) Access to a new and potentially beneficial treatment
yn
C) Opportunity to discuss personal feelings and experiences with an objective listener
D) Opportunity to help determine the research question that the study is based on
.m
w
5. Which of the following comprise the three primary ethical principles articulated by the
Belmont Report? Select all that apply.
w
A) Beneficence
w
B) Respect for human dignity
C) Anonymity
D) Justice
Page 1
, 6. If a researcher unobtrusively studies interactions among patients in a psychiatric
hospital, what might this be called?
A) Research misconduct
B) Breach of confidentiality
C) Covert data collection
D) Deception
7. The safeguard mechanism by which even the researcher cannot link the participant with
the information provided is called which of the following?
A) Confidentiality
m
B) Anonymity
C) Informed consent
co
D) Right to privacy
.
ep
8. Confidentiality of study participants can be most effectively protected by which of the
following?
pr
A) Avoiding the collection of any identifying information
B) Performing a risk/benefit assessment
st
C) Placing all identifying information on computer files rather than manual files
D) Obtaining informed consent from participants before the study
te
ng
9. Vulnerable study participants would include which of the following?
A) Women hospitalized for a mastectomy
si
B) Members of a senior citizens group
ur
C) People who do not speak English
D) Pediatric patients
yn
.m
10. In what situation is informed consent not needed?
A) The researcher pays the participants a stipend
w
B) The risk/benefit ratio is low
C) A Certificate of Confidentiality has been obtained
w
D) Informed consent is always needed
w
11. In a qualitative study that involves multiple contacts between the researcher and study
participants, the researcher may negotiate which of the following?
A) Implied consent
B) Stipend
C) Process consent
D) Risk/benefit ratio
Page 2