high school

Data are made anonymous by

-Destroying all identifiers connected to the data.

Connect with a professional writer in 5 simple steps

Please provide as many details about your writing struggle as possible

Academic level of your paper

Type of Paper

When is it due?

How many pages is this assigment?

-Requiring all members of the research team to sign confidentiality agreements.

-Keeping the key linking names to responses in a secure location.

-Reporting data in aggregate form in publications resulting from the research.

In a longitudinal study that will follow children from kindergarten through high school and will collect information about illegal activities, which of the following confidentiality procedures would protect against compelled disclosure of individually identifiable information?

-Using data encryption for stored files.

-Securing a Certificate of Confidentiality.

-Waiving documentation of consent.

-Using pseudonyms in research reports.

When a focus group deals with a potentially sensitive topic, which of the following statements about providing confidentiality to focus group participants is correct?

-If group members know each other confidentiality is not an issue.

-Using pseudonyms in reports removes the concern about any confidences shared in the group.

-The researcher cannot control what participants repeat about others outside the group.

-If group participants sign confidentiality agreements, the researcher can guarantee confidentiality.

A researcher leaves a research file in her car while she attends a concert and her car is stolen. The file contains charts of aggregated numerical data from a research study with human subjects, but no other documents. The consent form said that no identifying information would be retained, and the researcher adhered to that component. Which of the following statements best characterizes what occurred?

There was neither a violation of privacy nor a breach of confidentiality

-The subjects’ privacy has been violated.

-Confidentiality of the data has been breached

-There was both a violation of privacy and a breach of confidentiality.

Which of the following constitutes both a breach of a confidentiality (the research data have been disclosed, counter to the agreement between researcher and subjects) and a violation of subjects’ privacy (the right of the individuals to be protected against intrusion into their personal lives or affairs)?

-A researcher asks cocaine users to provide names and contact information of other cocaine users who might qualify for a study.

-A faculty member makes identifiable data about sexual behavior available to graduate students, although the subjects were assured that the data would be de-identified.

-A researcher, who is a guest, audio-records conversations at a series of private dinner parties to assess gender roles, without informing participants.

-In order to eliminate the effect of observation on behavior, a researcher attends a support group and records interactions without informing the attendees.

An investigator is studying women recently admitted to a state prison. All potential subjects must have children under the age of five. Research subjects will be given a basket of toys to use at their children’s first visit that the children can then take home. In assessing this proposal, the IRB needs to determine that the toys are:


“Is this question part of your assignment? We Can Help!”