Ethical Principles in Human Research

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is an example of how the principle of beneficence is applied to a study involving human subjects?

  • Maximizing sample sizes regardless of harm
  • Conducting research without consent
  • Ignoring participant well-being
  • Ensuring that risks are reasonable in relationship to anticipated benefits (correct)

What is the primary ethical violation in the Harvard 'Tastes, Ties, and Time (T3)' study?

Failure to protect research subjects from deductive disclosure

Which study is linked most directly to the establishment of the National Research Act in 1974?

The Public Health Service Tuskegee Study of Untreated Syphilis in the Negro Male

What does the Belmont principle of beneficence require?

<p>Potential benefits justify the risks of harm</p> Signup and view all the answers

According to the Belmont Report, what expresses the principle of justice?

<p>Fair outcomes in the selection of research subjects</p> Signup and view all the answers

What is defined as identifiable private information under federal regulations?

<p>Living human beings with data obtained through interaction or intervention</p> Signup and view all the answers

Provide an example of research with human subjects as per federal regulations.

<p>A developmental psychologist videotapes interactions between toddlers and caregivers</p> Signup and view all the answers

What type of information does the Census data represent?

<p>Public information</p> Signup and view all the answers

Provide an example of research with human subjects according to federal regulations.

<p>A study of 4th grade classrooms varying the timing of reading instruction</p> Signup and view all the answers

What is a medical record an example of?

<p>Private information</p> Signup and view all the answers

What action can a researcher expect if they submit a study to the IRB concerning oral histories of Bill Gates' acquaintances?

<p>The IRB will not review this study because it is not research as defined by federal regulations</p> Signup and view all the answers

Provide an example of research with human subjects according to federal regulations.

<p>An experiment on gender-related stereotypes in math</p> Signup and view all the answers

Provide an example of research with human subjects according to federal regulations.

<p>A cognitive psychologist enrolls students for a study on mood effects</p> Signup and view all the answers

What should an investigator do after a serious adverse drug experience occurs?

<p>Report the adverse drug experience in a timely manner as per IRB policies</p> Signup and view all the answers

For how long must consent documents, IRB correspondence, and research records be kept?

<p>For a minimum of three years after completion of the study</p> Signup and view all the answers

When may expedited review of a new study be used by the IRB?

<p>When the study involves no more than minimal risk</p> Signup and view all the answers

Amendments involving changes to IRB approved protocols do NOT need prior IRB approval if?

<p>Changes must be immediately implemented for the health and well-being of the subject</p> Signup and view all the answers

How often must IRB continuing review of an approved protocol occur?

<p>At least annually</p> Signup and view all the answers

What issue may arise regarding parental permission in research involving children at a clinic?

<p>Parents might feel pressure to give permission for their children's data to be used</p> Signup and view all the answers

What is a general requirement for informed consent?

<p>No informed consent may include any exculpatory language</p> Signup and view all the answers

In which scenario would it NOT be appropriate to provide subjects with information about missing elements of consent?

<p>When assigned to activities based on an undesirable physical characteristic</p> Signup and view all the answers

When may a waiver of documentation of informed consent be granted?

<p>When the principal risk is a breach of confidentiality</p> Signup and view all the answers

What must researchers provide potential subjects as part of the consent process?

<p>Information at the appropriate reading comprehension level</p> Signup and view all the answers

What constitutes both a breach of confidentiality and a violation of subjects' privacy?

<p>Making identifiable data about sexual behavior available to graduate students</p> Signup and view all the answers

How are data made anonymous?

<p>By destroying all identifiers connected to the data</p> Signup and view all the answers

What is true about providing confidentiality to focus group participants?

<p>The researcher cannot control what participants repeat about others outside the group</p> Signup and view all the answers

What confidentiality procedure protects against compelled disclosure of identifiable information in a longitudinal study?

<p>Securing a Certificate of Confidentiality</p> Signup and view all the answers

What best characterizes the situation where a researcher leaves a research file in a stolen car containing aggregated numerical data?

<p>There was neither a violation of privacy nor a breach of confidentiality</p> Signup and view all the answers

What consideration was relevant to the IRB's determination regarding a secondary analysis using a CDC database?

<p>The researcher will not be interacting with subjects and the data has no identifiers</p> Signup and view all the answers

What is true about a physician reviewing medical records of patients in a study?

<p>The study is human subject research which is eligible for expedited review</p> Signup and view all the answers

What does the incident of a stolen laptop containing patient identifiers constitute?

<p>A breach of confidentiality</p> Signup and view all the answers

What was NOT included as possibly leading to vulnerability according to NBAC?

<p>High potential for individual benefit from participating in research</p> Signup and view all the answers

What type of vulnerability might an acutely ill person face?

<p>Situational cognitive vulnerability</p> Signup and view all the answers

What are the four common abuses that give rise to vulnerability in research?

<p>Physical control, coercion, undue influence, and manipulation</p> Signup and view all the answers

Identify groups protected in federal regulations under 45 CFR 46.

<p>Pregnant women, prisoners, children</p> Signup and view all the answers

What constitutes an 'undue influence' in research inducements?

<p>Inducements alter a potential subject's decision-making processes</p> Signup and view all the answers

Flashcards are hidden until you start studying

Study Notes

Ethical Principles in Research

  • Beneficence involves ensuring that research risks are justified by potential benefits.
  • The Belmont principle of beneficence mandates that potential benefits must outweigh risks of harm.
  • Justice relates to fair outcomes in the selection of research subjects.

Historical Context of Research Ethics

  • The National Research Act (1974) and the Belmont Report were significantly influenced by the Tuskegee Study of Untreated Syphilis.
  • Ethical violations in research can arise when subjects are not protected from risks like deductive disclosure, as seen in the Harvard T3 study.

Human Subjects Research Regulations

  • Federal regulations define human subjects as living individuals from whom data is collected through interaction or identifiable private information.
  • Research involving human subjects must ensure informed consent without exculpatory language that waives legal rights.
  • Consent documents must be retained for at least three years post-study completion.
  • The IRB reviews studies to ensure ethical standards are met and must conduct continuing reviews annually.
  • Changes to IRB-approved protocols can be implemented without prior approval if critical for participant health.

Research Scenarios and Ethics

  • Studies involving children or using identifiable data, like medical records, must carefully consider consent and confidentiality.
  • A waiver for documentation of informed consent may be granted when the primary risk is confidentiality breach.

Confidentiality and Data Handling

  • Data anonymization is achieved by destroying all identifying information.
  • Breaches of confidentiality occur when identifiable data are disclosed contrary to agreements.
  • Researchers should secure Certificates of Confidentiality for studies involving sensitive information to protect against compelled disclosures.

Vulnerable Populations and Ethical Concerns

  • Certain groups, including pregnant women, prisoners, and children, receive additional protections under federal regulations.
  • Research inducements may lead to undue influence if they affect potential subjects' ability to weigh risks and benefits appropriately.

Additional Considerations

  • Situational cognitive vulnerability can arise in acutely ill individuals, increasing risks during participation.
  • Historical abuses rooted in physical control, coercion, undue influence, and manipulation have highlighted the need for rigorous ethical standards in research.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Informed Consent in Research
25 questions

Informed Consent in Research

UnforgettableAcademicArt avatar
UnforgettableAcademicArt
Informed Consent in Research
10 questions
Informed Consent in Research Ethics
41 questions
Human Subjects Research Ethics
59 questions

Human Subjects Research Ethics

SolicitousNephrite1992 avatar
SolicitousNephrite1992
Use Quizgecko on...
Browser
Browser