Podcast
Questions and Answers
Which of the following statements best characterizes what occurred when a researcher left a research file in her car, which was stolen, containing aggregated numerical data with no identifying information?
Which of the following statements best characterizes what occurred when a researcher left a research file in her car, which was stolen, containing aggregated numerical data with no identifying information?
Which of the following constitutes both a breach of confidentiality and a violation of subjects' privacy?
Which of the following constitutes both a breach of confidentiality and a violation of subjects' privacy?
What confidentiality procedure would protect against compelled disclosure of individually identifiable information in a longitudinal study following children?
What confidentiality procedure would protect against compelled disclosure of individually identifiable information in a longitudinal study following children?
Securing a Certificate of Confidentiality
The researcher can control what participants in a focus group repeat about others outside the group.
The researcher can control what participants in a focus group repeat about others outside the group.
Signup and view all the answers
How are data made anonymous?
How are data made anonymous?
Signup and view all the answers
Study Notes
Privacy and Confidentiality in Research
- Leaving a research file containing aggregated data in a car that gets stolen does not constitute a violation of privacy or confidentiality, as no identifying information was retained.
- A breach of confidentiality occurs when identifiable data is disclosed contrary to agreements made with research subjects while a violation of privacy involves intrusion into personal matters.
Breaches and Violations
- Providing identifiable data about sensitive topics, such as sexual behavior, to unauthorized individuals (e.g., graduate students) constitutes both a breach of confidentiality and a violation of subjects' privacy rights.
Protecting Sensitive Information
- In longitudinal studies involving children and sensitive information, obtaining a Certificate of Confidentiality is crucial to guard against required disclosure of identifiable information.
Focus Group Confidentiality
- Researchers cannot ensure complete confidentiality for focus group participants as they cannot control the information participants may share about each other outside the group.
Anonymization of Data
- Data anonymity is achieved by destroying all identifiers that could link data back to individual subjects, ensuring their identities are protected.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on privacy and confidentiality concepts in research with these flashcards. This quiz focuses on scenarios researchers might face regarding data protection and ethical considerations when dealing with human subjects. Perfect for anyone studying ethics in research.