Deck 3: Ethics: What Are My Responsibilities As a Researcher

Full screen (f)
exit full mode
Question
Very little Internet content is subject to copyright law.
Use Space or
up arrow
down arrow
to flip the card.
Question
Researchers' ethical responsibilities to participants includes which of the following?

A) protecting confidentiality but not anonymity of participants
B) avoiding debriefing participants when using deception
C) gaining informed consent
D) using participants' real names in the study
Question
The principle of utilitarianism argues for the greatest good for the greatest number.
Question
Writing a literature review can have ethical implications in research owned by other people/companies. This is also known as ______.

A) use of proprietary information
B) use of secondary sources
C) use of chronology
D) issues of confidentiality
Question
The main points of the Declaration of Helsinki do not include ______.

A) research protocols reviewed by an independent committee
B) research conducted by qualified individuals
C) research risks not exceeding the benefits
D) use of deception
Question
A Judeo-Christian test of ethical behavior is "would you be willing to be a participant in your research study yourself?"
Question
______ consists of qualified researchers with similar interests assessing each other's work.

A) Utilitarianism
B) The Belmont Report
C) IRB review
D) Peer review
Question
The "Common Rule" refers to standards known as the Federal Policy for the Protection of Human Subjects.
Question
In the United States, standards and regulations covering human subjects research are shared by several federal agencies. These shared standards are known as the ______.

A) Belmont Report
B) Common Rule
C) Declaration of Helsinki
D) Declaration of Human Rights
Question
______ means that the researcher will not release any information that identifies participants even if they know what information each participant provided them.

A) Confidentiality
B) Anonymity
C) Privacy
D) Personal safety
Question
Which are the three basic principles set out by the Belmont Report with regard to protection of human research subjects?

A) respect for persons, appropriate compensation, and justice
B) respect for persons, appropriate compensation, and beneficence
C) appropriate compensation, random selection, and justice
D) respect for persons, beneficence, and justice
Question
The categorical imperative ethic proposes that a behavior is valid if you are willing to see it applied as a universal rule.
Question
Which one of the following is typically TRUE of informed consent forms?

A) explains the nature of the study
B) explains the right of the researcher to stop participants from leaving the study
C) explains the right of the research to ban access the results of the study
D) explains the right of participants to be paid for participating in the study
Question
The Nuremberg Code was the first international code to emphasize that research participants must ______.

A) consent to participate in the research
B) be adults
C) be guaranteed confidentiality
D) be guaranteed anonymity
Question
It is generally safe to assume that individuals on the Internet are who they say they are.
Question
A major problem with Internet research is establishing the authenticity of individuals in cyberspace.
Question
A study in which the researcher observes people's behavior without them being aware of it is also known as ______.

A) unobtrusive measures
B) control group
C) confederates study
D) survey research
Question
The basic assumption of peer review is that the people best equipped to evaluate your work and its impact on human research participants are appropriately qualified people doing similar work to your own.
Question
Which ethical position argues that a behavior is valid if you're willing to apply it universally?

A) Judeo-Christian perspective
B) categorical imperative
C) utilitarianism
D) the veil of ignorance
Question
The "Veil of Ignorance" approach asks us to take a dispassionate approach, reviewing all sides of a decision equally.
Question
For some studies, the informed consent document will need to be in a language other than English.
Question
When you promise your participants confidentiality, it means while you can identify them as participants, you will not release that information to other people.
Question
Using summary (secondary), article gets you the same information as using primary (original) sources.
Question
Confidentiality and anonymity mean the same thing.
Question
When your participants are anonymous, nobody can identify who they are, even the researcher.
Question
Because research studies need a variety of participants, it's acceptable to pressure people to participate, even those who have said they don't want to.
Question
It is not necessary to explain to readers that deception was used in your research report.
Question
Since research studies are written in scholarly style, it's appropriate for the informed consent documents to be in scholarly style.
Question
A research study that finds nothing is an invalid study.
Question
Participants have a right to access the results of the study.
Question
Using deception in research is acceptable even if you don't notify the participants after the study is concluded.
Question
Plagiarism is an unethical representation of others' work as your own.
Question
Articles that do not support your argument should still be included in the literature review.
Question
Once participants sign consent forms, they're required to participate in the research study.
Question
Web survey software guarantees anonymity to Internet survey respondents.
Question
Using deception in research is always unethical.
Question
When a researcher uses unobtrusive measures, it means the participants don't know they're being observed.
Question
Although a research study only has volunteers who are students, it's acceptable to generalize to all people.
Question
Confederates are participants who have been briefed to act in a certain way, essentially "faking it" and deceiving other participants.
Question
Plagiarism can become a copyright issue in the case of proprietary research.
Question
High-risk studies online require minimal identity verification.
Question
Low-risk studies online require minimal identity verification.
Question
Identify and explain the main ethical responsibilities of communication researchers toward their research participants.
Question
Explain the steps involved in getting informed consent from participants.
Question
Discuss, with examples, whether deceiving participants in a research project is ever justifiable.
Question
Identify and explain two main points of the 1948 Nuremberg Code.
Question
Describe the three-step process for ethical research with social media.
Question
What is the purpose of the IRB?
Question
Explain the ethical issues related to identifying people in research on the Internet.
Question
Briefly explain what is meant by the term "peer review."
Question
Identify the types of human communication research that might potentially cause distress to research participants.
Question
An important privacy issue in online research is cross-nation data storage.
Question
The three key principles of the Belmont Report are respect for persons, beneficence, and justice. Explain what, in practice, each of these means.
Question
Explain the different connotations of the following terms for the people in your research: subject, respondent, informant, and collaborator.
Question
Explain the difference between the principle of utilitarianism and the categorical imperative in ethical positions.
Question
Informant, collaborator, and participant can all mean the same thing in research studies.
Question
What is the difference between anonymity and confidentiality? How is it relevant for your participants?
Question
Identify and explain the main points of the Declaration of Helsinki.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/58
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Ethics: What Are My Responsibilities As a Researcher
1
Very little Internet content is subject to copyright law.
False
2
Researchers' ethical responsibilities to participants includes which of the following?

A) protecting confidentiality but not anonymity of participants
B) avoiding debriefing participants when using deception
C) gaining informed consent
D) using participants' real names in the study
C
3
The principle of utilitarianism argues for the greatest good for the greatest number.
True
4
Writing a literature review can have ethical implications in research owned by other people/companies. This is also known as ______.

A) use of proprietary information
B) use of secondary sources
C) use of chronology
D) issues of confidentiality
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
5
The main points of the Declaration of Helsinki do not include ______.

A) research protocols reviewed by an independent committee
B) research conducted by qualified individuals
C) research risks not exceeding the benefits
D) use of deception
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
6
A Judeo-Christian test of ethical behavior is "would you be willing to be a participant in your research study yourself?"
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
7
______ consists of qualified researchers with similar interests assessing each other's work.

A) Utilitarianism
B) The Belmont Report
C) IRB review
D) Peer review
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
8
The "Common Rule" refers to standards known as the Federal Policy for the Protection of Human Subjects.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
9
In the United States, standards and regulations covering human subjects research are shared by several federal agencies. These shared standards are known as the ______.

A) Belmont Report
B) Common Rule
C) Declaration of Helsinki
D) Declaration of Human Rights
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
10
______ means that the researcher will not release any information that identifies participants even if they know what information each participant provided them.

A) Confidentiality
B) Anonymity
C) Privacy
D) Personal safety
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
11
Which are the three basic principles set out by the Belmont Report with regard to protection of human research subjects?

A) respect for persons, appropriate compensation, and justice
B) respect for persons, appropriate compensation, and beneficence
C) appropriate compensation, random selection, and justice
D) respect for persons, beneficence, and justice
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
12
The categorical imperative ethic proposes that a behavior is valid if you are willing to see it applied as a universal rule.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
13
Which one of the following is typically TRUE of informed consent forms?

A) explains the nature of the study
B) explains the right of the researcher to stop participants from leaving the study
C) explains the right of the research to ban access the results of the study
D) explains the right of participants to be paid for participating in the study
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
14
The Nuremberg Code was the first international code to emphasize that research participants must ______.

A) consent to participate in the research
B) be adults
C) be guaranteed confidentiality
D) be guaranteed anonymity
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
15
It is generally safe to assume that individuals on the Internet are who they say they are.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
16
A major problem with Internet research is establishing the authenticity of individuals in cyberspace.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
17
A study in which the researcher observes people's behavior without them being aware of it is also known as ______.

A) unobtrusive measures
B) control group
C) confederates study
D) survey research
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
18
The basic assumption of peer review is that the people best equipped to evaluate your work and its impact on human research participants are appropriately qualified people doing similar work to your own.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
19
Which ethical position argues that a behavior is valid if you're willing to apply it universally?

A) Judeo-Christian perspective
B) categorical imperative
C) utilitarianism
D) the veil of ignorance
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
20
The "Veil of Ignorance" approach asks us to take a dispassionate approach, reviewing all sides of a decision equally.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
21
For some studies, the informed consent document will need to be in a language other than English.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
22
When you promise your participants confidentiality, it means while you can identify them as participants, you will not release that information to other people.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
23
Using summary (secondary), article gets you the same information as using primary (original) sources.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
24
Confidentiality and anonymity mean the same thing.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
25
When your participants are anonymous, nobody can identify who they are, even the researcher.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
26
Because research studies need a variety of participants, it's acceptable to pressure people to participate, even those who have said they don't want to.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
27
It is not necessary to explain to readers that deception was used in your research report.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
28
Since research studies are written in scholarly style, it's appropriate for the informed consent documents to be in scholarly style.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
29
A research study that finds nothing is an invalid study.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
30
Participants have a right to access the results of the study.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
31
Using deception in research is acceptable even if you don't notify the participants after the study is concluded.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
32
Plagiarism is an unethical representation of others' work as your own.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
33
Articles that do not support your argument should still be included in the literature review.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
34
Once participants sign consent forms, they're required to participate in the research study.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
35
Web survey software guarantees anonymity to Internet survey respondents.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
36
Using deception in research is always unethical.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
37
When a researcher uses unobtrusive measures, it means the participants don't know they're being observed.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
38
Although a research study only has volunteers who are students, it's acceptable to generalize to all people.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
39
Confederates are participants who have been briefed to act in a certain way, essentially "faking it" and deceiving other participants.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
40
Plagiarism can become a copyright issue in the case of proprietary research.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
41
High-risk studies online require minimal identity verification.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
42
Low-risk studies online require minimal identity verification.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
43
Identify and explain the main ethical responsibilities of communication researchers toward their research participants.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
44
Explain the steps involved in getting informed consent from participants.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
45
Discuss, with examples, whether deceiving participants in a research project is ever justifiable.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
46
Identify and explain two main points of the 1948 Nuremberg Code.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
47
Describe the three-step process for ethical research with social media.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
48
What is the purpose of the IRB?
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
49
Explain the ethical issues related to identifying people in research on the Internet.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
50
Briefly explain what is meant by the term "peer review."
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
51
Identify the types of human communication research that might potentially cause distress to research participants.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
52
An important privacy issue in online research is cross-nation data storage.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
53
The three key principles of the Belmont Report are respect for persons, beneficence, and justice. Explain what, in practice, each of these means.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
54
Explain the different connotations of the following terms for the people in your research: subject, respondent, informant, and collaborator.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
55
Explain the difference between the principle of utilitarianism and the categorical imperative in ethical positions.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
56
Informant, collaborator, and participant can all mean the same thing in research studies.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
57
What is the difference between anonymity and confidentiality? How is it relevant for your participants?
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
58
Identify and explain the main points of the Declaration of Helsinki.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 58 flashcards in this deck.