The typical first main phase in response to a research misconduct allegation is called Quizlet

Question: Which of the following is true regarding research misconduct? A. Federal funding agencies typically rely on an institution to make the initial response to an allegation of research misconduct. B. The U.S. government is required to reveal publicly the identity of any person who commits misconduct. C. Funding agencies normally perform their own misconduct inquiry before the institution becomes involved. D. A central federal agency handles all cases of research misconduct.

Show or Reveal the Answer

Federal funding agencies typically rely on an institution to make the initial response to an allegation of research misconduct.


Question: An example of an individual financial COI is: A: A researcher’s spouse holds equity in a publicly traded pharmaceutical company that is also the sponsor of the researcher’s study. B: A researcher’s spouse works at the same university as the researcher. C: A researcher is considering buying stock in a publicly traded company that specializes in making and delivering hand-tossed pizza. D: A researcher’s 10-year-old child wins a local science competition, the prize for which is a $5,000 scholarship to a workshop sponsored by a local company that sponsors one of the researcher’s ongoing projects.

Show or Reveal the Answer

A researcher’s spouse holds equity in a publicly traded pharmaceutical company that is also the sponsor of the researcher’s study.

An individual COI may arise when an individual has a personal or financial interest, which may affect or appear to affect the design, conduct, or reporting of the research.


Question: Which of the following statements is true regarding the regulations that govern research? A: International research is governed by the United Nations instead of any specific country’s regulations. B: The research of an international graduate student enrolled at a U.S. university is not governed by U.S. regulations unless the student plans to publish the results. C: U.S. funded research collaborations are often governed by U.S. regulations no matter where the research takes place. D: International research collaborations involving U.S. funded researchers are not governed by U.S. regulations when the work takes place at a private university.

Show or Reveal the Answer

U.S. funded research collaborations are often governed by U.S. regulations no matter where the research takes place.


Question: An example of an institutional coi is: A: the organization gives scholarships to some post-doctoral researchers B: an industry sponsor pays for the construction of a new research laboratory at the organization C: one of the organization's deans is the vice-chair of the organization's IRB D: the organization's president is a member of the board of trustees for a local non-profit organization that does not sponsor research at the organization

Show or Reveal the Answer

an industry sponsor pays for the construction of a new research laboratory at the organization


Question: Which of the following is considered a SBR data collection method? A: Hearing/audiological screenings B: Interviews

Show or Reveal the Answer

Interviews EXPLANATION: Hearing screenings, blood draws, and other physical exams are usually designed to collect physiological data, not information about attitudes and beliefs. Interviews are designed to collect information about attitudes, beliefs, and behavior and are data collection methods typically used by SBR researchers.


Question: Which of the following most accurately describes the risks associated with SBR? Answer: Less predictable, more variable, and less treatable than physical harms EXPLANATION: It is more difficult to predict how individuals will react to questions and situations in which their behavior is observed or manipulated than to physical data collection methods such as blood draws. The reactions may be of considerable duration. Once those reactions happen, they may be difficult to assess, serious enough to require treatment and may even be untreatable compared to treating physical harms.

Question: An investigator obtains consent and HIPAA authorization from subjects to review their medical records and HIV status. He plans to go back to the medical record, so the HIV status information is stored along with subject identifiers in a database that he keeps on his laptop computer. His laptop is stolen. This incident constitutes:

Answer: A breach of confidentiality EXPLANATION: Privacy is about people and their expectations. Privacy risk pertains primarily to the methods used to obtain information about subjects. Confidentiality pertains to the actual treatment of the personal information once it is obtained. In other words, now that the researcher has obtained private information, how will it be used, stored, and reported. Clearly, this event represents a breach of confidentiality.

Question: A researcher wants to conduct a secondary analysis using a Centers for Disease Control and Prevention (CDC) database that was collected by the agency solely for surveillance purposes from 1996- 2006. The researcher did not participate in the initial collection of the data. The database is publicly available. The database does not include any identifiers. The IRB makes a determination that the individuals whose records will be reviewed do not meet the federal definition of human subjects. Which of the following considerations was relevant to the IRB's determination that this activity does not constitute research with human subjects?

A: The researcher will not be interacting/intervening with subjects and the data has no identifiers. B: The database reflects data collected originally for surveillance purposes. C: The CDC is a federal agency. D: The data was collected between 1996-2006.

Show or Reveal the Answer

The researcher will not be interacting/intervening with subjects and the data has no identifiers.


Which of the following is true regarding the U.S. Federal Research Misconduct Policy? Which of the following is true regarding the u.s. federal research misconduct policy citi A: The Policy covers conflicts of interest and the misuse of grant funding. B: The standard of innocent until proven guilty does not apply in misconduct cases. C: Misconduct must be proven beyond a reasonable doubt. D: To have a misconduct finding, the action must have been committed intentionally, knowingly, or recklessly.

Show or Reveal the Answer

To have a misconduct finding, the action must have been committed intentionally, knowingly, or recklessly.


What are the three main goals of data lifecycle management (DLM)? A: Technology, sharing, and disposal B: Confidentiality, availability, and integrity C: Ownership, propriety, and control D: Secrecy, privacy, and disposal

Show or Reveal the Answer

Confidentiality, availability, and integrity Integrity, Data availability, and data security/confidentiality are the three main goals of data lifecycle management.


Which of the following is true regarding data analysis? A: Disciplines and professions do not provide guidance on data analysis. B: Data analysis methods can typically be specified at the close of a study after it is clear what kind of data has been collected. C: Data analysis methods should be specified in advance before a study begins. D: Data analysis methods are generally uniform across disciplines.

Show or Reveal the Answer

Data analysis methods should be specified in advance before a study begins.


Which of the following most accurately describes data lifecycle management (DLM)? A: It refers to the obligation to uphold data confidentiality imposed by federal law. B: It refers to the data collection requirements of a particular organization. C: It refers to the obligation to share data imposed by professional journals. D: It refers to the tools and processes for handling data during a research study and after it concludes.

Show or Reveal the Answer

Answer : It refers to the tools and processes for handling data during a research study and after it concludes. EXPLANATION: DLM refers to use of the range of technical tools and processes that protect data during a study’s lifecycle.


Risk of harm in social and behavioral sciences generally fall in three categories, which are: A: Invasion of privacy, breach of confidentiality, and study procedures B: Invasion of privacy, adverse reaction to study drug, and discrimination C: Study procedures, breach of confidentiality, and loss of employment D: Breach of confidentiality, loss of autonomy, and study procedures

Show or Reveal the Answer

Invasion of privacy, breach of confidentiality, and study procedures

EXPLANATION: Invasion of privacy, breach of confidentiality, and study procedures are the three categories that risks of harm in SBE research generally fall in. Invasions of privacy can occur if personal information is accessed or collected without the subjects' knowledge or consent. Confidentiality can be compromised through an unauthorized release of data, which could have a negative impact on the subjects' psychological, social, or economic status. In some cases, simply taking part in research can put subjects at risk. For example, if a researcher is conducting interviews with individual gang members, it may be necessary to find places to meet where other members of the gang could not observe the interaction.

Within the context of rcr, social responsibility primarily refers to: ANSWER: The obligation to design technology or acquire information in ways that take into account what effects those actions may have on society a researcher wants to conduct a secondary analysis additional safeguards that may be included in a social and behavioral study may include: an investigator obtains consent and hipaa authorization from subjects as of january 2015, the nih expects as of january 2015, the nih expects as part of the consent process, the federal regulations require researchers to: belmont principle of beneficence requires that citi genetic research in human populations continuing review of an approved and ongoing study genetic research in human populations identify one way faculty researchers can possibly avoid undue influence of student subjects? in order to grant a waiver or alteration in order to grant a waiver or alteration of the requirements in order to grant a waiver or alteration of the requirements of informed consent quizlet in order to grant a waiver or alteration of the requirements quizlet irb continuing review of a greater than minimal risk quizlet issued in 1974, 45 cfr 46 raised to regulatory status: records based research quizlet research involving prisoners quizlet sbr data collections method risks the coi management plan aims to: the expedited review categories have quizlet the national research act of 1974 the nbac looks at characteristics individuals might have that would prevent the purpose of informed consent is: the use of prisoners in research is a concern under the belmont principle of justice because: when an irb is reviewing a research study which choice is the best definition of “genetic determinism?” which is an example of a situation where deferential vulnerability might be a factor? which of the following meets the regulatory definition of prisoner? which of the following statements is accurate in determining subject risk which of the following statements is true about 're contacting subjects from a biobank your informed consent form must describe quizlet citi conflicts of interest (rcr-basic) citi quizlet in any collaboration, data ownership is typically determined by: research misconduct (rcr-basic) quizlet the main reason that the royal society of london developed the modern form of peer review was to: the most important factor in determining whether a research collaboration will be successful is: the typical first main phase in response to a research misconduct allegation is called: the u.s. government is required to reveal publicly the identity of any person who commits misconduct what is the main function of a technology transfer office with respect to collaborative research? what is the main function of the bayh-dole act of 1980 as it relates to academic institutions? what is the most appropriate process for research collaborators to use in determining which journal what is the primary responsibility of oversight bodies (such as an irb or iacuc)? which author is normally responsible for sharing reprints of a publication with readers? which of the following is a responsibility of each author? which of the following is true regarding academic-industry collaborations? which of the following is true regarding industry-sponsored research? which of the following is true regarding the reporting of research results? which of the following is true regarding the use of animals in research? which of the following most accurately describes data lifecycle management (dlm)? which of the following statements is true concerning data selection? which of the following statements is true regarding the responsibilities of reviewers?

What is the first main phase in response to a research misconduct allegation?

The inquiry The inquiry is generally the first main phase in response to a research misconduct allegation.

Which of the following is considered research misconduct quizlet?

According to U.S. Federal Research Misconduct Policy, which of the following is considered to be research misconduct? Making up data or results and recording or reporting them.

Which of the following is considered research misconduct?

Research Misconduct is defined as fabrication, falsification, or plagiarism in proposing, performing, or reviewing research, or in reporting research results.

Is this considered a research misconduct under federal policy?

To be considered research misconduct, actions must: represent a “significant departure from accepted practices”; have been “committed intentionally, or knowingly, or recklessly”; and be “proven by a preponderance of evidence.”