CIS 600: Research Ethics and Conflict of Interest
18 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the term used to describe the manipulation of research material, process, reports, or results?

  • Privacy
  • Plagiarism
  • Fabrication (correct)
  • Confidentiality

Which of the following acts involves the use of fake or 'made-up' data?

  • Falsification
  • Plagiarism
  • Fabrication (correct)
  • Privacy

What is the term for the use of another person's work without proper attribution?

  • Plagiarism (correct)
  • Falsification
  • Confidentiality
  • Fabrication

Which of the following statements best describes confidentiality in healthcare research?

<p>Confidentiality arises from sharing private information in confidence with another party. (D)</p> Signup and view all the answers

What does HIPAA stand for in healthcare research?

<p>Health Insurance Portability and Accountability Act (D)</p> Signup and view all the answers

Which title of HIPAA addresses privacy standards and security standards?

<p>Title II (B)</p> Signup and view all the answers

In healthcare research, what does 'privacy' refer to?

<p>The right to be let alone (C)</p> Signup and view all the answers

'Preempted' means that state laws protecting health information privacy will:

<p>Be overridden by federal laws like HIPAA (D)</p> Signup and view all the answers

'Disclosure' in healthcare research refers to:

<p>The dissemination of information outside an organization (B)</p> Signup and view all the answers

What is considered a breach under HIPAA?

<p>Unauthorized acquisition, access, use, or disclosure of PHI that compromises the security or privacy of such information (D)</p> Signup and view all the answers

When must affected individuals be notified in case of a breach as per HIPAA regulations?

<p>Without unreasonable delay and no more than 60 days from when first known or should have known (A)</p> Signup and view all the answers

Under what circumstances is media used to notify the public about a breach of PHI?

<p>When 500 or more individuals are affected (B)</p> Signup and view all the answers

What is the purpose of HIPAA's Breach Notification rule?

<p>To ensure timely notification of individuals in case of a breach of their PHI (C)</p> Signup and view all the answers

Which type of patent application is the most common with the U.S. Patent Office?

<p>Utility Patents (B)</p> Signup and view all the answers

What is the main characteristic of utility patents?

<p>They protect new and useful processes, machines, articles of manufacture, and compositions of matter (D)</p> Signup and view all the answers

Which category of patents involves protecting the aesthetic appearance of an object rather than its functionality?

<p>Design Patents (D)</p> Signup and view all the answers

In what context would fair use be applicable?

<p>Critiquing or commenting on a copyrighted work for educational purposes (A)</p> Signup and view all the answers

Which type of patent typically protects new and distinct varieties of plants?

<p>Plant Patents (D)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser