Human Subjects Learners(CITI) quiz – Flashcards
Unlock all answers in this set
Unlock answers
question
Which of the following is an example of how the principle of beneficence is applied to a study involving human subjects?
answer
Ensuring that risks are reasonable in relationship to anticipated benefits.
question
The researcher's failure to protect research subjects from deductive disclosure is the primary ethical violation in which of the following studies?
answer
Harvard "Tastes, Ties, and Time (T3)" study (2006-2009)" study
question
Which of the following studies is linked most directly to the establishment of the National Research Act in 1974 and ultimately to the Belmont Report and Federal regulations for human subject protection?
answer
The Public Health Service Tuskegee Study of Untreated Syphilis in the Negro Male.
question
The Belmont principle of beneficence requires that:
answer
Potential benefits justify the risks of harm.
question
According to the Belmont Report, the moral requirement that there be fair outcomes in the selection of research subjects, expresses the principle of:
answer
Justice.
question
According to the federal regulations, human subjects are living human beings about whom an investigator obtains data through interaction or intervention with the individual or:
answer
Identifiable private information.
question
According to the federal regulations, which of the following studies meets the definition of research with human subjects?
answer
A developmental psychologist videotapes interactions between groups of toddlers and their care givers to determine which intervention methods most effectively manage aggression.
question
Census data (the final report as published by the Census Bureau) is an example of:
answer
Public information.
question
According to the federal regulations, which of the following studies meets the definition of research with human subjects?
answer
A study of twenty 4th grade classrooms in which researchers ask the schools to systematically vary the time of day reading is taught, and collect weekly assessments of reading comprehension for each child over a three-month period.
question
A medical record is an example of:
answer
Private information.
question
A professor at Big State University is writing a biography about Bill Gates and conducting oral histories with all of Bill Gates' friends, family members and business acquaintances. The researcher submits the research proposal to the institution's IRB. What action can he expect by the IRB?
answer
The IRB will not review this study because it is not research as defined by the federal regulations.
question
According to the federal regulations, which of the following studies meets the definition of research with human subjects?
answer
An experiment is proposed on the relationship between gender-related stereotypes in math and the subsequent performance by males and females on math tests.
question
According to the federal regulations, which of the following studies meets the definition of research with human subjects?
answer
A cognitive psychologist enrolls undergraduate students for a computer-based study about the effect of mood on problem solving behaviors.
question
A subject in a clinical research trial experiences a serious, unanticipated adverse drug experience. How should the investigator proceed, with respect to the IRB, after the discovery of the adverse event occurrence?
answer
Report the adverse drug experience in a timely manner, in keeping with the IRB's policies and procedures, using the forms or the mechanism provided by the IRB.
question
How long is an investigator required to keep consent documents, IRB correspondence, and research records?
answer
For a minimum of three years after completion of the study
question
According to federal regulations, which of the following best describes when expedited review of a new, proposed study may be used by the IRB?
answer
The study involves no more than minimal risk and meets one of the allowable categories of expedited review specified in federal regulations
question
Amendments involving changes to IRB approved protocols do NOT need prior IRB approval if:
answer
The changes must be immediately implemented for the health and well being of the subject.
question
IRB continuing review of an approved protocol must:
answer
Occur at least annually.
question
A therapist at a free university clinic treats elementary school children with behavior problems who are referred by a social service agency. She is also a doctoral candidate who proposes using data she has and will collect about the children for a case-based research project. Which of the following statements about parental permission is correct?
answer
The parents of the children might feel pressure to give permission to the therapist to use their children's data so that she will continue to provide services to their children.
question
A general requirement for informed consent is that no informed consent may include any exculpatory language. Exculpatory language is that which waives or appears to waive any of the subject's legal rights or releases or appears to release those conducting the research from liability for negligence. Which of the following statements in a consent form is an example of exculpatory language?
answer
Taking part in the research is voluntary, but if you choose to take part, you waive the right to legal redress for any research-related injuries.
question
A criterion for waiving informed consent is that, when appropriate, subjects are provided additional pertinent information after the study. In which of the following studies would it NOT be appropriate to provide subjects with information about missing elements of consent:
answer
A study in which subjects were assigned to study activities based on an undesirable or unflattering physical characteristic as assessed by members of the research team.
question
A waiver of the requirement for documentation of informed consent may be granted when:
answer
The only record linking the subject and the research is the consent document and the principal risk is a breach of confidentiality.
question
As part of the consent process, the federal regulations require researchers to:
answer
Provide potential subjects with information at the appropriate reading comprehension level.
question
Which of the following constitutes both a breach of confidentiality (the research data have been disclosed, counter to the agreement between researcher and subjects) and a violation of subjects' privacy (the right of the individuals to be protected against intrusion into their personal lives or affairs)?
answer
A faculty member makes identifiable data about sexual behavior available to graduate students, although the subjects were assured that the data would be de-identified.
question
Data are made anonymous by
answer
Destroying all identifiers connected to the data.
question
When a focus group deals with a potentially sensitive topic, which of the following statements about providing confidentiality to focus group participants is correct?
answer
The researcher cannot control what participants repeat about others outside the group.
question
In a longitudinal study that will follow children from kindergarten through high school and will collect information about illegal activities, which of the following confidentiality procedures would protect against compelled disclosure of individually identifiable information?
answer
Securing a Certificate of Confidentiality.
question
A researcher leaves a research file in her car while she attends a concert and her car is stolen. The file contains charts of aggregated numerical data from a research study with human subjects, but no other documents. The consent form said that no identifying information would be retained, and the researcher adhered to that component. Which of the following statements best characterizes what occurred?
answer
There was neither a violation of privacy nor a breach of confidentiality.
question
A researcher wants to conduct a secondary analysis using a Centers for Disease Control and Prevention (CDC) database that was collected by the agency solely for surveillance purposes from 1996-2006. The researcher did not participate in the initial collection of the data. The database is publicly available. The database does not include any identifiers. The IRB makes a determination that the individuals whose records will be reviewed do not meet the federal definition of human subjects. Which of the following considerations was relevant to the IRB's determination that this activity does not constitute research with human subjects?
answer
The researcher will not be interacting/intervening with subjects and the data has no identifiers.
question
As part of a research study, a physician plans to review medical records of the next 50 of her patients who require magnetic resonance imaging (MRI) scans for clinical treatment to explore factors related to patients requiring MRI scans. The physician will review the medical records, and write down the clinical indication for the scans, any existing injuries, current prescriptions, as well as other clinical data. The clinical indication for the scans and the other clinical data will be collected in the medical records for treatment purposes as part of standard clinical care. The physician will use a coding system to be able to identify the patient's information; however, the "key" to the coding system will be stored separately from the data in a locked cabinet that only she will have access to. Which of the following is true?
answer
The study is human subject research which is eligible for expedited review.
question
An investigator obtains consent from subjects to review their medical records and HIV status. He plans to go back to the medical record, so the HIV status information is stored along with patient identifiers in a database that he keeps on his laptop computer. His laptop is stolen. This incident constitutes:
answer
A breach of confidentiality.
question
NBAC proposed a concept of vulnerability in research based on features of potential subjects or of their situation. Which of the following was NOT included as possibly leading to vulnerability?
answer
High potential for individual benefit from participating in research
question
n considering NBAC's analytic approach, an otherwise competent person who is acutely ill might be considered at especially high risk of harm for:
answer
Situational cognitive vulnerability
question
According to the authors, there are four common abuses that historically are described as giving rise to vulnerability . Which response below contains the correct four?
answer
Physical control, coercion, undue influence, and manipulation
question
Identify the following groups that are protected in the federal regulations (45 CFR 46), specifically in Subparts B, C and D with additional protections:
answer
Pregnant women, prisoners, children
question
Which is true of inducements in research?
answer
Inducements constitute an "undue influence" if they alter a potential subject's decision-making processes, such that they do not appropriately weigh the risk-benefit relationship of the research.