RA Certification Questions Flashcards
38 Questions
100 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Additional protections researchers can include in their practice to protect subject privacy and data confidentiality include: (Select all that apply)

  • Destroying all identifiers connected to the data
  • Requiring all members of the research team to sign confidentiality agreements
  • Reporting data in aggregate form in publications resulting from the research
  • Keeping the key linking names to responses in a secure location
  • All of the above (correct)
  • Which of the following is a responsibility of each author?

  • Corresponding with the journal editor
  • Performing the data analysis
  • Directly observing data collection
  • Confirming that data have been accurately presented in the paper (correct)
  • Which of the following is true regarding an acknowledgments section?

  • It is the norm that individuals should not be asked whether they want to be listed in the acknowledgments section
  • Journals typically request that the person who provides financial support for the research be listed as an author instead of being listed in the acknowledgments section
  • The contributions of technicians and other researchers are often listed in the acknowledgments section if they do not meet all of the criteria for authorship (correct)
  • An acknowledgments section is necessary for disclosing if research is supported by federal funds, but the section is not necessary if a corporate sponsor supports research
  • What is the main function of the Bayh-Dole Act of 1980 as it relates to academic institutions?

    <p>It allows institutions to have control over the intellectual property from federally-funded research</p> Signup and view all the answers

    What is the main function of a Technology Transfer Office with respect to collaborative research?

    <p>It helps collaborative researchers to commercialize their work</p> Signup and view all the answers

    The most important factor in determining whether a research collaboration will be successful is:

    <p>Whether there is ongoing communication among the team members about their goals and responsibilities</p> Signup and view all the answers

    Which of the following is true regarding academic-industry collaborations?

    <p>The industry sponsor typically owns the data from research that it funds</p> Signup and view all the answers

    What is the most appropriate process for research collaborators to use in determining which journal they should submit their work to?

    <p>The research team should discuss the issue early on and while the project is ongoing</p> Signup and view all the answers

    The entity that normally is supposed to determine whether an academic researcher's conflict of interest can be managed is:

    <p>A conflict of interest committee</p> Signup and view all the answers

    The main focus of NIH's conflict of interest policy is:

    <p>Financial conflicts of interest</p> Signup and view all the answers

    Which of the following is true about the management of conflicts of interest?

    <p>Management plans are often created to reduce the impact of conflicts of interest</p> Signup and view all the answers

    Which of the following most accurately describes an institutional conflict of interest?

    <p>It occurs when an institution's financial or non-financial interests could interfere with its research activities</p> Signup and view all the answers

    If researchers allow their moral or other personal beliefs to influence their objectivity, this is most likely an example of:

    <p>A conflict of conscience</p> Signup and view all the answers

    Which of the following statements is true regarding the responsibilities of a reviewer?

    <p>A reviewer's conflict of interest should be disclosed to the journal editor or grant agency</p> Signup and view all the answers

    The two main criteria that the National Science Foundation (NSF) uses to evaluate grant proposals are:

    <p>Intellectual merit and broader impact</p> Signup and view all the answers

    Reviewers have a responsibility to promote ethical peer review by:

    <p>Preserving the confidentiality of the submission</p> Signup and view all the answers

    A reviewer's main responsibility is to:

    <p>Behave professionally</p> Signup and view all the answers

    Which of the following is the most appropriate step to take if authors believe that their manuscript was reviewed unfairly?

    <p>The author can contact the editor with their concerns</p> Signup and view all the answers

    According to U.S. Federal Research Misconduct Policy, which of the following is considered to be research misconduct?

    <p>Plagiarism</p> Signup and view all the answers

    Which type of research misconduct most likely occurred if someone intentionally removes data points from the data set in order to generate a deceptive conclusion?

    <p>Falsification</p> Signup and view all the answers

    Which of the following is true regarding the U.S. Federal Research Misconduct Policy?

    <p>To have a misconduct finding, the action must have been committed intentionally, knowingly, or recklessly</p> Signup and view all the answers

    Which of the following is most likely to be considered plagiarism?

    <p>Using materials from a source without proper citation</p> Signup and view all the answers

    The typical first main phase in response to a research misconduct allegation is called:

    <p>The inquiry</p> Signup and view all the answers

    The regulatory agency that oversees export controls related to financial transactions and other sanctions is:

    <p>The Office of Foreign Assets Control (OFAC)</p> Signup and view all the answers

    Exporting can occur:

    <p>Physically and electronically</p> Signup and view all the answers

    The regulatory agency that oversees export controls related to military items is:

    <p>The Directorate of Defense Trade Controls (DDTC)</p> Signup and view all the answers

    When traveling internationally, an individual:

    <p>Should verify, with institution's ECO, if any of their electronic devices or other tools-of-trade equipment or any research is restricted prior to leaving</p> Signup and view all the answers

    An item that is used all over the world:

    <p>May still be controlled</p> Signup and view all the answers

    Which of the following are not research data?

    <p>Medical records</p> Signup and view all the answers

    What is the main role of the Institutional Review Board (IRB) in the research process?

    <p>Ensures proper attention to confidentiality and privacy of human subjects</p> Signup and view all the answers

    What are some common groups within a university that researchers may partner with to implement a data management plan (DMP)?

    <p>All of the above</p> Signup and view all the answers

    What practice should not be followed when storing confidential, sensitive, and/or personal data?

    <p>Keep personal information in the data files</p> Signup and view all the answers

    Which of the following stakeholders is most likely to own the data resulting from a research project?

    <p>The organization that receives federal funding for a project</p> Signup and view all the answers

    Which of the following is a defining characteristic of a psychologically healthy research training environment?

    <p>Mentees can provide and respond to feedback without fear of personal attacks</p> Signup and view all the answers

    Which of the following most accurately describes a good mentoring practice?

    <p>Encourage mentees to receive mentoring from a collection of individuals</p> Signup and view all the answers

    Which of the following is most likely to create a poor relationship between a mentor and a mentee?

    <p>The mentor recruits mentees merely for the mentor's own career advancement</p> Signup and view all the answers

    Which of the following statements most accurately describes the mentoring relationship?

    <p>Mentors teach mentees about aspects of academic life that are not covered in textbooks</p> Signup and view all the answers

    Which statement is true about cultivating a psychologically healthy and supportive research environment?

    <p>Research mentors are responsible for creating and monitoring the quality of a research environment</p> Signup and view all the answers

    Study Notes

    Research Ethics and Responsibilities

    • Researchers should protect subject privacy and data confidentiality by destroying identifiers, requiring confidentiality agreements, reporting data in aggregate, and securing keys that link names to responses.
    • Each author is responsible for confirming accurate data presentation in a paper, ensuring integrity in research publications.

    Acknowledgments and Author Criteria

    • Acknowledgments sections typically include contributions from technicians and researchers who do not meet authorship criteria.
    • Financial supporters of research may not be listed as authors; they should be acknowledged appropriately.
    • The Bayh-Dole Act of 1980 allows academic institutions control over intellectual property stemming from federally funded research.
    • Technology Transfer Offices assist researchers in commercializing their findings.

    Collaboration Success Factors

    • Ongoing communication among team members regarding goals and responsibilities is crucial for successful research collaborations.
    • Academic-industry collaborations typically result in industry sponsors owning the data from funded research.

    Conflict of Interest Management

    • Conflicts of interest should be managed by designated committees, not by individual researchers.
    • The National Institutes of Health (NIH) focuses on financial conflicts of interest in its policies.

    Peer Review Responsibilities

    • Reviewers must disclose conflicts of interest to journal editors and maintain confidentiality during the peer review process.
    • The National Science Foundation (NSF) evaluates grant proposals based on intellectual merit and broader impact.

    Plagiarism and Research Misconduct

    • Plagiarism involves using others' materials without proper citation, considered a serious violation of research ethics.
    • Misconduct, including falsification and plagiarism, is defined as intentional actions committed recklessly.

    Export Controls and Research Data

    • The Office of Foreign Assets Control (OFAC) oversees export controls related to financial transactions.
    • Exporting can happen both physically and electronically, emphasizing the need for compliance even for widely used items.

    Institutional Review Boards (IRBs)

    • IRBs ensure the confidentiality and privacy of human subjects involved in research.
    • They also evaluate research proposals involving sensitive data or methodologies.

    Data Management Partnerships

    • Collaborating with university groups like the library, IT, and sponsored research offices is vital for forming effective data management plans.
    • Confidential data should be stored securely, and personal information must not be included in research data files.

    Mentoring Practices

    • A psychologically healthy mentoring environment allows for open feedback without fear of personal attacks.
    • Mentors play a critical role in teaching mentees about academic life, which is not typically covered in textbooks.

    Research Environment Responsibility

    • A supportive research environment is influenced significantly by the culture of the institution and the behavior of mentors.
    • Research mentors are accountable for establishing a high-quality research atmosphere where mentees can thrive.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge with these flashcards focused on research administration certification questions. This quiz covers essential practices for ensuring subject privacy and data confidentiality in research. Challenge yourself and enhance your understanding of ethical research practices.

    More Like This

    Use Quizgecko on...
    Browser
    Browser