Questions with Complete
Solutions
Denning [Date] [Course title]
, Why are institutionally provisioned technology systems (in other words, systems provided through a
university, hospital, or clinic) generally more secure than consumer products? - Correct Answers
Because information technology professionals have vetted them with the vendor.
When would an IRB consider the risks of a study to be controlled? - Correct Answers When there is an
appropriate risk mitigation and management plan in place.
What existing federal regulations define technology-based risk assessment? - Correct Answers None of
the above
Why do custom-built, homegrown, and/or investigational technologies pose the greatest risk to
research participants? - Correct Answers Because researchers cannot know all the potential risks until
participants have used the technology in practice.
How can a Bring Your Own Device (BYOD) study approach reduce or mitigate technology-related risks? -
Correct Answers The participant may already know the risks of using the device if they are familiar with
it for personal use. This decision indicates a level of pre-research risk acceptance.
Data lifecycle management refers to what? - Correct Answers The ongoing oversight of research data by
the researchers for the study's duration
Instead of "data will be stored on the researcher's computer," what should a strong data security plan
state? - Correct Answers Data will be stored on an encrypted computer with a strong password that only
the researcher knows.
What is passive mobile data collection? - Correct Answers Data collection that occurs on the device that
the researcher and participant are unaware of
Which of the following is an example of how the principle of beneficence can be applied to a study
employing human subjects? - Correct Answers Determining that the study has a maximization of
benefits and a minimization of risks.