Deck 3: Ethics: What Are My Responsibilities As a Researcher

ملء الشاشة (f)
exit full mode
سؤال
Very little Internet content is subject to copyright law.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Researchers' ethical responsibilities to participants includes which of the following?

A) protecting confidentiality but not anonymity of participants
B) avoiding debriefing participants when using deception
C) gaining informed consent
D) using participants' real names in the study
سؤال
The principle of utilitarianism argues for the greatest good for the greatest number.
سؤال
Writing a literature review can have ethical implications in research owned by other people/companies. This is also known as ______.

A) use of proprietary information
B) use of secondary sources
C) use of chronology
D) issues of confidentiality
سؤال
The main points of the Declaration of Helsinki do not include ______.

A) research protocols reviewed by an independent committee
B) research conducted by qualified individuals
C) research risks not exceeding the benefits
D) use of deception
سؤال
A Judeo-Christian test of ethical behavior is "would you be willing to be a participant in your research study yourself?"
سؤال
______ consists of qualified researchers with similar interests assessing each other's work.

A) Utilitarianism
B) The Belmont Report
C) IRB review
D) Peer review
سؤال
The "Common Rule" refers to standards known as the Federal Policy for the Protection of Human Subjects.
سؤال
In the United States, standards and regulations covering human subjects research are shared by several federal agencies. These shared standards are known as the ______.

A) Belmont Report
B) Common Rule
C) Declaration of Helsinki
D) Declaration of Human Rights
سؤال
______ means that the researcher will not release any information that identifies participants even if they know what information each participant provided them.

A) Confidentiality
B) Anonymity
C) Privacy
D) Personal safety
سؤال
Which are the three basic principles set out by the Belmont Report with regard to protection of human research subjects?

A) respect for persons, appropriate compensation, and justice
B) respect for persons, appropriate compensation, and beneficence
C) appropriate compensation, random selection, and justice
D) respect for persons, beneficence, and justice
سؤال
The categorical imperative ethic proposes that a behavior is valid if you are willing to see it applied as a universal rule.
سؤال
Which one of the following is typically TRUE of informed consent forms?

A) explains the nature of the study
B) explains the right of the researcher to stop participants from leaving the study
C) explains the right of the research to ban access the results of the study
D) explains the right of participants to be paid for participating in the study
سؤال
The Nuremberg Code was the first international code to emphasize that research participants must ______.

A) consent to participate in the research
B) be adults
C) be guaranteed confidentiality
D) be guaranteed anonymity
سؤال
It is generally safe to assume that individuals on the Internet are who they say they are.
سؤال
A major problem with Internet research is establishing the authenticity of individuals in cyberspace.
سؤال
A study in which the researcher observes people's behavior without them being aware of it is also known as ______.

A) unobtrusive measures
B) control group
C) confederates study
D) survey research
سؤال
The basic assumption of peer review is that the people best equipped to evaluate your work and its impact on human research participants are appropriately qualified people doing similar work to your own.
سؤال
Which ethical position argues that a behavior is valid if you're willing to apply it universally?

A) Judeo-Christian perspective
B) categorical imperative
C) utilitarianism
D) the veil of ignorance
سؤال
The "Veil of Ignorance" approach asks us to take a dispassionate approach, reviewing all sides of a decision equally.
سؤال
For some studies, the informed consent document will need to be in a language other than English.
سؤال
When you promise your participants confidentiality, it means while you can identify them as participants, you will not release that information to other people.
سؤال
Using summary (secondary), article gets you the same information as using primary (original) sources.
سؤال
Confidentiality and anonymity mean the same thing.
سؤال
When your participants are anonymous, nobody can identify who they are, even the researcher.
سؤال
Because research studies need a variety of participants, it's acceptable to pressure people to participate, even those who have said they don't want to.
سؤال
It is not necessary to explain to readers that deception was used in your research report.
سؤال
Since research studies are written in scholarly style, it's appropriate for the informed consent documents to be in scholarly style.
سؤال
A research study that finds nothing is an invalid study.
سؤال
Participants have a right to access the results of the study.
سؤال
Using deception in research is acceptable even if you don't notify the participants after the study is concluded.
سؤال
Plagiarism is an unethical representation of others' work as your own.
سؤال
Articles that do not support your argument should still be included in the literature review.
سؤال
Once participants sign consent forms, they're required to participate in the research study.
سؤال
Web survey software guarantees anonymity to Internet survey respondents.
سؤال
Using deception in research is always unethical.
سؤال
When a researcher uses unobtrusive measures, it means the participants don't know they're being observed.
سؤال
Although a research study only has volunteers who are students, it's acceptable to generalize to all people.
سؤال
Confederates are participants who have been briefed to act in a certain way, essentially "faking it" and deceiving other participants.
سؤال
Plagiarism can become a copyright issue in the case of proprietary research.
سؤال
High-risk studies online require minimal identity verification.
سؤال
Low-risk studies online require minimal identity verification.
سؤال
Identify and explain the main ethical responsibilities of communication researchers toward their research participants.
سؤال
Explain the steps involved in getting informed consent from participants.
سؤال
Discuss, with examples, whether deceiving participants in a research project is ever justifiable.
سؤال
Identify and explain two main points of the 1948 Nuremberg Code.
سؤال
Describe the three-step process for ethical research with social media.
سؤال
What is the purpose of the IRB?
سؤال
Explain the ethical issues related to identifying people in research on the Internet.
سؤال
Briefly explain what is meant by the term "peer review."
سؤال
Identify the types of human communication research that might potentially cause distress to research participants.
سؤال
An important privacy issue in online research is cross-nation data storage.
سؤال
The three key principles of the Belmont Report are respect for persons, beneficence, and justice. Explain what, in practice, each of these means.
سؤال
Explain the different connotations of the following terms for the people in your research: subject, respondent, informant, and collaborator.
سؤال
Explain the difference between the principle of utilitarianism and the categorical imperative in ethical positions.
سؤال
Informant, collaborator, and participant can all mean the same thing in research studies.
سؤال
What is the difference between anonymity and confidentiality? How is it relevant for your participants?
سؤال
Identify and explain the main points of the Declaration of Helsinki.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/58
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: Ethics: What Are My Responsibilities As a Researcher
1
Very little Internet content is subject to copyright law.
False
2
Researchers' ethical responsibilities to participants includes which of the following?

A) protecting confidentiality but not anonymity of participants
B) avoiding debriefing participants when using deception
C) gaining informed consent
D) using participants' real names in the study
C
3
The principle of utilitarianism argues for the greatest good for the greatest number.
True
4
Writing a literature review can have ethical implications in research owned by other people/companies. This is also known as ______.

A) use of proprietary information
B) use of secondary sources
C) use of chronology
D) issues of confidentiality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
5
The main points of the Declaration of Helsinki do not include ______.

A) research protocols reviewed by an independent committee
B) research conducted by qualified individuals
C) research risks not exceeding the benefits
D) use of deception
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
6
A Judeo-Christian test of ethical behavior is "would you be willing to be a participant in your research study yourself?"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
7
______ consists of qualified researchers with similar interests assessing each other's work.

A) Utilitarianism
B) The Belmont Report
C) IRB review
D) Peer review
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
8
The "Common Rule" refers to standards known as the Federal Policy for the Protection of Human Subjects.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
9
In the United States, standards and regulations covering human subjects research are shared by several federal agencies. These shared standards are known as the ______.

A) Belmont Report
B) Common Rule
C) Declaration of Helsinki
D) Declaration of Human Rights
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
10
______ means that the researcher will not release any information that identifies participants even if they know what information each participant provided them.

A) Confidentiality
B) Anonymity
C) Privacy
D) Personal safety
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which are the three basic principles set out by the Belmont Report with regard to protection of human research subjects?

A) respect for persons, appropriate compensation, and justice
B) respect for persons, appropriate compensation, and beneficence
C) appropriate compensation, random selection, and justice
D) respect for persons, beneficence, and justice
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
12
The categorical imperative ethic proposes that a behavior is valid if you are willing to see it applied as a universal rule.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which one of the following is typically TRUE of informed consent forms?

A) explains the nature of the study
B) explains the right of the researcher to stop participants from leaving the study
C) explains the right of the research to ban access the results of the study
D) explains the right of participants to be paid for participating in the study
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
14
The Nuremberg Code was the first international code to emphasize that research participants must ______.

A) consent to participate in the research
B) be adults
C) be guaranteed confidentiality
D) be guaranteed anonymity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
15
It is generally safe to assume that individuals on the Internet are who they say they are.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
16
A major problem with Internet research is establishing the authenticity of individuals in cyberspace.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
17
A study in which the researcher observes people's behavior without them being aware of it is also known as ______.

A) unobtrusive measures
B) control group
C) confederates study
D) survey research
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
18
The basic assumption of peer review is that the people best equipped to evaluate your work and its impact on human research participants are appropriately qualified people doing similar work to your own.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which ethical position argues that a behavior is valid if you're willing to apply it universally?

A) Judeo-Christian perspective
B) categorical imperative
C) utilitarianism
D) the veil of ignorance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
20
The "Veil of Ignorance" approach asks us to take a dispassionate approach, reviewing all sides of a decision equally.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
21
For some studies, the informed consent document will need to be in a language other than English.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
22
When you promise your participants confidentiality, it means while you can identify them as participants, you will not release that information to other people.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
23
Using summary (secondary), article gets you the same information as using primary (original) sources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
24
Confidentiality and anonymity mean the same thing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
25
When your participants are anonymous, nobody can identify who they are, even the researcher.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
26
Because research studies need a variety of participants, it's acceptable to pressure people to participate, even those who have said they don't want to.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
27
It is not necessary to explain to readers that deception was used in your research report.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
28
Since research studies are written in scholarly style, it's appropriate for the informed consent documents to be in scholarly style.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
29
A research study that finds nothing is an invalid study.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
30
Participants have a right to access the results of the study.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
31
Using deception in research is acceptable even if you don't notify the participants after the study is concluded.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
32
Plagiarism is an unethical representation of others' work as your own.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
33
Articles that do not support your argument should still be included in the literature review.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
34
Once participants sign consent forms, they're required to participate in the research study.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
35
Web survey software guarantees anonymity to Internet survey respondents.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
36
Using deception in research is always unethical.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
37
When a researcher uses unobtrusive measures, it means the participants don't know they're being observed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
38
Although a research study only has volunteers who are students, it's acceptable to generalize to all people.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
39
Confederates are participants who have been briefed to act in a certain way, essentially "faking it" and deceiving other participants.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
40
Plagiarism can become a copyright issue in the case of proprietary research.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
41
High-risk studies online require minimal identity verification.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
42
Low-risk studies online require minimal identity verification.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
43
Identify and explain the main ethical responsibilities of communication researchers toward their research participants.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
44
Explain the steps involved in getting informed consent from participants.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
45
Discuss, with examples, whether deceiving participants in a research project is ever justifiable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
46
Identify and explain two main points of the 1948 Nuremberg Code.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
47
Describe the three-step process for ethical research with social media.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
48
What is the purpose of the IRB?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
49
Explain the ethical issues related to identifying people in research on the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
50
Briefly explain what is meant by the term "peer review."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
51
Identify the types of human communication research that might potentially cause distress to research participants.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
52
An important privacy issue in online research is cross-nation data storage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
53
The three key principles of the Belmont Report are respect for persons, beneficence, and justice. Explain what, in practice, each of these means.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
54
Explain the different connotations of the following terms for the people in your research: subject, respondent, informant, and collaborator.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
55
Explain the difference between the principle of utilitarianism and the categorical imperative in ethical positions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
56
Informant, collaborator, and participant can all mean the same thing in research studies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
57
What is the difference between anonymity and confidentiality? How is it relevant for your participants?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
58
Identify and explain the main points of the Declaration of Helsinki.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 58 في هذه المجموعة.