Information Technology > QUESTIONS & ANSWERS > CITI Module #3 Questions and Answers Latest Update 100% Correct (All)

CITI Module #3 Questions and Answers Latest Update 100% Correct

Document Content and Description Below

CITI Module #3 Questions and Answers Latest Update 100% Correct Data are made anonymous by -Destroying all identifiers connected to the data. -Requiring all members of the research team to sign co... nfidentiality agreements. -Keeping the key linking names to responses in a secure location. -Reporting data in aggregate form in publications resulting from the research. ✔✔Destroying all identifiers connected to the data. In a longitudinal study that will follow children from kindergarten through high school and will collect information about illegal activities, which of the following confidentiality procedures would protect against compelled disclosure of individually identifiable information? -Using data encryption for stored files. -Securing a Certificate of Confidentiality. -Waiving documentation of consent. -Using pseudonyms in research reports. ✔✔Securing a Certificate of Confidentiality When a focus group deals with a potentially sensitive topic, which of the following statements about providing confidentiality to focus group participants is correct? -If group members know each other confidentiality is not an issue. -Using pseudonyms in reports removes the concern about any confidences shared in the group. -The researcher cannot control what participants repeat about others outside the group. -If group participants sign confidentiality agreements, the researcher can guarantee confidentiality. ✔✔The researcher cannot control what participants repeat about others outside the group A researcher leaves a research file in her car while she attends a concert and her car is stolen. The file contains charts of aggregated numerical data from a research study with human subjects, but no other documents. The consent form said that no identifying information would be retained, and the researcher adhered to that component. Which of the following statements best characterizes what occurred? -There was neither a violation of privacy nor a breach of confidentiality -The subjects' privacy has been violated. -Confidentiality of the data has been breached -There was both a violation of privacy and a breach of confidentiality. ✔✔There was neither a violation of privacy nor a breach of confidentiality Which of the following constitutes both a breach of a confidentiality (the research data have been disclosed, counter to the agreement between researcher and subjects) and a violation of subjects' privacy (the right of the individuals to be protected against intrusion into their personal lives or affairs)? -A researcher asks cocaine users to provide names and contact information of other cocaine users who might qualify for a study. -A faculty member makes identifiable data about sexual behavior available to graduate students, although the subjects were assured that the data would be de-identified. -A researcher, who is a guest, audio-records conversations at a series of private dinner parties to assess gender roles, without informing participants. -In order to eliminate the effect of observation on be [Show More]

Last updated: 1 year ago

Preview 1 out of 29 pages

Also available in bundle (1)

CITI Bundled exams with complete solution

CITI All Modules with complete solution CITI questions and answers 2022 with complete solution CITI Training Quiz Questions and Answers Latest 2022;Solved correctly CITI quiz 2022 with complete soluti...

By Nutmegs 1 year ago

$47

19  

Reviews( 0 )

$10.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
79
0

Document information


Connected school, study & course


About the document


Uploaded On

Sep 02, 2022

Number of pages

29

Written in

Seller


seller-icon
Nutmegs

Member since 2 years

572 Documents Sold


Additional information

This document has been written for:

Uploaded

Sep 02, 2022

Downloads

 0

Views

 79

Document Keyword Tags

Recommended For You


$10.00
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·