Podcast
Questions and Answers
Additional protections researchers can include in their practice to protect subject privacy and data confidentiality include: (Select all that apply)
Additional protections researchers can include in their practice to protect subject privacy and data confidentiality include: (Select all that apply)
Which of the following is a responsibility of each author?
Which of the following is a responsibility of each author?
Which of the following is true regarding an acknowledgments section?
Which of the following is true regarding an acknowledgments section?
What is the main function of the Bayh-Dole Act of 1980 as it relates to academic institutions?
What is the main function of the Bayh-Dole Act of 1980 as it relates to academic institutions?
Signup and view all the answers
What is the main function of a Technology Transfer Office with respect to collaborative research?
What is the main function of a Technology Transfer Office with respect to collaborative research?
Signup and view all the answers
The most important factor in determining whether a research collaboration will be successful is:
The most important factor in determining whether a research collaboration will be successful is:
Signup and view all the answers
Which of the following is true regarding academic-industry collaborations?
Which of the following is true regarding academic-industry collaborations?
Signup and view all the answers
What is the most appropriate process for research collaborators to use in determining which journal they should submit their work to?
What is the most appropriate process for research collaborators to use in determining which journal they should submit their work to?
Signup and view all the answers
The entity that normally is supposed to determine whether an academic researcher's conflict of interest can be managed is:
The entity that normally is supposed to determine whether an academic researcher's conflict of interest can be managed is:
Signup and view all the answers
The main focus of NIH's conflict of interest policy is:
The main focus of NIH's conflict of interest policy is:
Signup and view all the answers
Which of the following is true about the management of conflicts of interest?
Which of the following is true about the management of conflicts of interest?
Signup and view all the answers
Which of the following most accurately describes an institutional conflict of interest?
Which of the following most accurately describes an institutional conflict of interest?
Signup and view all the answers
If researchers allow their moral or other personal beliefs to influence their objectivity, this is most likely an example of:
If researchers allow their moral or other personal beliefs to influence their objectivity, this is most likely an example of:
Signup and view all the answers
Which of the following statements is true regarding the responsibilities of a reviewer?
Which of the following statements is true regarding the responsibilities of a reviewer?
Signup and view all the answers
The two main criteria that the National Science Foundation (NSF) uses to evaluate grant proposals are:
The two main criteria that the National Science Foundation (NSF) uses to evaluate grant proposals are:
Signup and view all the answers
Reviewers have a responsibility to promote ethical peer review by:
Reviewers have a responsibility to promote ethical peer review by:
Signup and view all the answers
A reviewer's main responsibility is to:
A reviewer's main responsibility is to:
Signup and view all the answers
Which of the following is the most appropriate step to take if authors believe that their manuscript was reviewed unfairly?
Which of the following is the most appropriate step to take if authors believe that their manuscript was reviewed unfairly?
Signup and view all the answers
According to U.S. Federal Research Misconduct Policy, which of the following is considered to be research misconduct?
According to U.S. Federal Research Misconduct Policy, which of the following is considered to be research misconduct?
Signup and view all the answers
Which type of research misconduct most likely occurred if someone intentionally removes data points from the data set in order to generate a deceptive conclusion?
Which type of research misconduct most likely occurred if someone intentionally removes data points from the data set in order to generate a deceptive conclusion?
Signup and view all the answers
Which of the following is true regarding the U.S. Federal Research Misconduct Policy?
Which of the following is true regarding the U.S. Federal Research Misconduct Policy?
Signup and view all the answers
Which of the following is most likely to be considered plagiarism?
Which of the following is most likely to be considered plagiarism?
Signup and view all the answers
The typical first main phase in response to a research misconduct allegation is called:
The typical first main phase in response to a research misconduct allegation is called:
Signup and view all the answers
The regulatory agency that oversees export controls related to financial transactions and other sanctions is:
The regulatory agency that oversees export controls related to financial transactions and other sanctions is:
Signup and view all the answers
Exporting can occur:
Exporting can occur:
Signup and view all the answers
The regulatory agency that oversees export controls related to military items is:
The regulatory agency that oversees export controls related to military items is:
Signup and view all the answers
When traveling internationally, an individual:
When traveling internationally, an individual:
Signup and view all the answers
An item that is used all over the world:
An item that is used all over the world:
Signup and view all the answers
Which of the following are not research data?
Which of the following are not research data?
Signup and view all the answers
What is the main role of the Institutional Review Board (IRB) in the research process?
What is the main role of the Institutional Review Board (IRB) in the research process?
Signup and view all the answers
What are some common groups within a university that researchers may partner with to implement a data management plan (DMP)?
What are some common groups within a university that researchers may partner with to implement a data management plan (DMP)?
Signup and view all the answers
What practice should not be followed when storing confidential, sensitive, and/or personal data?
What practice should not be followed when storing confidential, sensitive, and/or personal data?
Signup and view all the answers
Which of the following stakeholders is most likely to own the data resulting from a research project?
Which of the following stakeholders is most likely to own the data resulting from a research project?
Signup and view all the answers
Which of the following is a defining characteristic of a psychologically healthy research training environment?
Which of the following is a defining characteristic of a psychologically healthy research training environment?
Signup and view all the answers
Which of the following most accurately describes a good mentoring practice?
Which of the following most accurately describes a good mentoring practice?
Signup and view all the answers
Which of the following is most likely to create a poor relationship between a mentor and a mentee?
Which of the following is most likely to create a poor relationship between a mentor and a mentee?
Signup and view all the answers
Which of the following statements most accurately describes the mentoring relationship?
Which of the following statements most accurately describes the mentoring relationship?
Signup and view all the answers
Which statement is true about cultivating a psychologically healthy and supportive research environment?
Which statement is true about cultivating a psychologically healthy and supportive research environment?
Signup and view all the answers
Study Notes
Research Ethics and Responsibilities
- Researchers should protect subject privacy and data confidentiality by destroying identifiers, requiring confidentiality agreements, reporting data in aggregate, and securing keys that link names to responses.
- Each author is responsible for confirming accurate data presentation in a paper, ensuring integrity in research publications.
Acknowledgments and Author Criteria
- Acknowledgments sections typically include contributions from technicians and researchers who do not meet authorship criteria.
- Financial supporters of research may not be listed as authors; they should be acknowledged appropriately.
Legal and Institutional Frameworks
- The Bayh-Dole Act of 1980 allows academic institutions control over intellectual property stemming from federally funded research.
- Technology Transfer Offices assist researchers in commercializing their findings.
Collaboration Success Factors
- Ongoing communication among team members regarding goals and responsibilities is crucial for successful research collaborations.
- Academic-industry collaborations typically result in industry sponsors owning the data from funded research.
Conflict of Interest Management
- Conflicts of interest should be managed by designated committees, not by individual researchers.
- The National Institutes of Health (NIH) focuses on financial conflicts of interest in its policies.
Peer Review Responsibilities
- Reviewers must disclose conflicts of interest to journal editors and maintain confidentiality during the peer review process.
- The National Science Foundation (NSF) evaluates grant proposals based on intellectual merit and broader impact.
Plagiarism and Research Misconduct
- Plagiarism involves using others' materials without proper citation, considered a serious violation of research ethics.
- Misconduct, including falsification and plagiarism, is defined as intentional actions committed recklessly.
Export Controls and Research Data
- The Office of Foreign Assets Control (OFAC) oversees export controls related to financial transactions.
- Exporting can happen both physically and electronically, emphasizing the need for compliance even for widely used items.
Institutional Review Boards (IRBs)
- IRBs ensure the confidentiality and privacy of human subjects involved in research.
- They also evaluate research proposals involving sensitive data or methodologies.
Data Management Partnerships
- Collaborating with university groups like the library, IT, and sponsored research offices is vital for forming effective data management plans.
- Confidential data should be stored securely, and personal information must not be included in research data files.
Mentoring Practices
- A psychologically healthy mentoring environment allows for open feedback without fear of personal attacks.
- Mentors play a critical role in teaching mentees about academic life, which is not typically covered in textbooks.
Research Environment Responsibility
- A supportive research environment is influenced significantly by the culture of the institution and the behavior of mentors.
- Research mentors are accountable for establishing a high-quality research atmosphere where mentees can thrive.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge with these flashcards focused on research administration certification questions. This quiz covers essential practices for ensuring subject privacy and data confidentiality in research. Challenge yourself and enhance your understanding of ethical research practices.