CITI Privacy and Confidentiality Flashcards
5 Questions
100 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following statements best characterizes what occurred when a researcher left a research file in her car, which was stolen, containing aggregated numerical data with no identifying information?

  • The researcher failed to adhere to ethical standards.
  • There was a breach of confidentiality.
  • There was neither a violation of privacy nor a breach of confidentiality. (correct)
  • There was a violation of privacy.
  • Which of the following constitutes both a breach of confidentiality and a violation of subjects' privacy?

  • A study collects anonymous data from participants.
  • A researcher refrains from releasing any data.
  • A faculty member makes identifiable data about sexual behavior available to graduate students, although the data were assured to be de-identified. (correct)
  • A researcher presents aggregated data without any identifiers.
  • What confidentiality procedure would protect against compelled disclosure of individually identifiable information in a longitudinal study following children?

    Securing a Certificate of Confidentiality

    The researcher can control what participants in a focus group repeat about others outside the group.

    <p>False</p> Signup and view all the answers

    How are data made anonymous?

    <p>Destroying all identifiers connected to the data.</p> Signup and view all the answers

    Study Notes

    Privacy and Confidentiality in Research

    • Leaving a research file containing aggregated data in a car that gets stolen does not constitute a violation of privacy or confidentiality, as no identifying information was retained.
    • A breach of confidentiality occurs when identifiable data is disclosed contrary to agreements made with research subjects while a violation of privacy involves intrusion into personal matters.

    Breaches and Violations

    • Providing identifiable data about sensitive topics, such as sexual behavior, to unauthorized individuals (e.g., graduate students) constitutes both a breach of confidentiality and a violation of subjects' privacy rights.

    Protecting Sensitive Information

    • In longitudinal studies involving children and sensitive information, obtaining a Certificate of Confidentiality is crucial to guard against required disclosure of identifiable information.

    Focus Group Confidentiality

    • Researchers cannot ensure complete confidentiality for focus group participants as they cannot control the information participants may share about each other outside the group.

    Anonymization of Data

    • Data anonymity is achieved by destroying all identifiers that could link data back to individual subjects, ensuring their identities are protected.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on privacy and confidentiality concepts in research with these flashcards. This quiz focuses on scenarios researchers might face regarding data protection and ethical considerations when dealing with human subjects. Perfect for anyone studying ethics in research.

    More Like This

    Research Ethics and Methods
    14 questions
    Use Quizgecko on...
    Browser
    Browser