Chapter 9: Ethics in Research
Test Bank
MULTIPLE CHOICE
1. A research study offers elderly men who have, in the past, been prison inmates $1,500 for
participation in an all-day workshop at which they agree to be hypnotized and tell stories of
incarceration, which are later published. The research participants are allowed to listen to the
tapes of what they say under hypnosis and to withdraw permission to use any part of the
information. Why is this scenario a violation of self-determination?
a. Allowing participants to withdraw permission to use part of the research information violates
the study integrity and represents deception.
b. It is an example of coercion.
c. Prisoners are a vulnerable population and should not be used as research subjects.
d. What is said under hypnosis may not be true.
ANS: B
The right to self-determination is based on the ethical principle of respect for persons. This
principle holds that because humans are capable of self-determination, or controlling their
own destiny, they should be treated as autonomous agents who have the freedom to conduct
their lives as they choose without external controls. A subject’s right to self-determination
can be violated through the use of (1) coercion, (2) covert data collection, and (3) deception.
Coercion occurs when an overt threat of harm or excessive reward is intentionally presented
by one person to another to obtain his or her compliance. In the example, offering elderly
men
$1,500 for one day could be considered offering an excessive reward: therefore, it is an act of
coercion violating the human right to self-determination.
DIF: Cognitive Level: Analysis REF: Page 164
2. A researcher working for Google collects data on fair treatment in the workplace. He attempts
to attach one of the raw data forms to a message to himself, so that he can finish the data
, analysis at home that evening, but accidentally sends it to another employee who had
provided data for the study. The two employees, coincidentally, have an identical opinion
about fair treatment in the workplace. This best describes an example of a violation of which
of the following human rights?
a. Confidentiality
b. Fair treatment
c. Protection from harm
d. None of these—no ethical violation occurred, because the two subjects share a point of view.
ANS: A
Confidentiality is the researcher’s management of private information shared by a subject that
must not be shared with others without the authorization of the subject. In the example,
sending one research subject the raw data of a different subject is a direct breach of
confidentiality. A breach in confidentiality can occur when a researcher, by accident or direct
action, allows an unauthorized person to gain access to raw study data. The right to fair
treatment is based on the ethical principle of justice. This principle holds that each person
should be treated fairly and should receive what he or she is due or owed. The right to
protection from discomfort and harm is based on the ethical principle of beneficence, which
holds that one should do good and, above all, do no harm.
DIF: Cognitive Level: Application REF: Page 172
3. In a study of outpatients experiencing panic attacks, a researcher was working in a busy clinic
waiting room and left his computer to consent a new study participant. A transcription of a
patient interview was displayed, and at the end of the transcription was the patient’s medical
record number and a list of medications currently taken. The researcher had not closed down
the screen, and when he returned to his computer, he found an adult patient playing a video
game on the computer. This best describes an example of a violation of which of the
following human rights?
a. Protection from the harm of exposure
b. Security
c. Confidentiality
d. Privacy
,
, .com - The Marketplace to Buy and Sell your Study Material
ANS: D
Privacy is an individual’s right to determine the time, extent, and general circumstances under
which personal information will be shared with or withheld from others. This information
consists of one’s attitudes, beliefs, behaviors, opinions, and records. The Privacy Act of 1974
provided the initial protection of an individual’s privacy. Because of this act, data collection
methods were to be scrutinized to protect subjects’ privacy, and data cannot be gathered from
subjects without their knowledge. Individuals also have the right to access their records and
to prevent access by others. The intent of this act was to prevent the invasion of privacy that
occurs when private information is shared without an individual’s knowledge or against his or
her will. Invading an individual’s privacy might cause loss of dignity, friendships, or
employment or create feelings of anxiety, guilt, embarrassment, or shame. The HIPAA
Privacy Rule expanded the protection of an individual’s privacy, specifically his or her
protected individually identifiable health information, and described the ways in which
covered entities can use or disclose this information. De-identifying health data involves
removing 18 elements that could be used to identify an individual. An important one on this
list is the individual’s medical record number. In the example, the researcher’s use of an
actual patient identification number on a transcription risks the human right to privacy; a code
number should have been used instead.
DIF: Cognitive Level: Application REF: Page 169
4. Ellen is a participant in a research study. She will receive either the customary medication to
treat her metastatic colon cancer or a new medication that has shown better results in animal
studies and one small human study. This is research.
a. Coercive
b. Correlational c. Therapeutic d. Dangerous
ANS: C
Therapeutic research gives the patient an opportunity to receive an experimental treatment
that might have beneficial results. Nontherapeutic research is conducted to generate
knowledge for a discipline, and the results from the study might benefit future patients but