If there is sufficient evidence to proceed, what is the next main phase that takes place after the inquiry in response to a research misconduct allegation? | An investigation The investigation phase occurs after the inquiry if there is sufficient evidence to indicate that research misconduct may have taken place. |
The typical first main phase in response to a research misconduct allegation is called: Remediation | The inquiry The inquiry is generally the first main phase in response to a research misconduct allegation. |
If a researcher creates the idea for a project and is not listed in the preferred author order position on resulting publications, is this considered to be research misconduct under federal policy? No; instead it is a type of authorship dispute. | No; instead it is a type of authorship dispute. Situations involving disagreements about author order are not considered to be research misconduct under federal policy. |
Which type of research misconduct most likely occurred if someone intentionally removes data points from the data set in order to generate a deceptive conclusion? | Falsification This situation most likely involves falsification. Falsification includes deceptively changing or omitting data. |
Which of the following is the most effective strategy for preventing research misconduct? | Good mentoring Among the options mentioned, good mentoring is the most effective strategy for preventing research misconduct. |
What is the primary responsibility of oversight bodies (such as an IRB or IACUC)? To ensure that a study is methodologically and technically sound. | To determine compliance with regulatory requirements, including those relating to protecting research subjects. The primary responsibility of oversight bodies (such as an IRB or IACUC) is to assess legal-regulatory compliance, and if applicable, to protect research subjects. |
Which of the following is most likely to own the data resulting from a research project? The organization that receives federal funding for a project. | The organization that receives federal funding for a project. The organization that receives a federally-funded grant can typically claim ownership of the data from the project. |
Which of the following statements is true concerning data selection? A data selection strategy is required by federal law. | Establishing a data selection strategy prior to collecting data decreases the chance of a biased outcome. The data selection strategy should be planned in advance to minimize bias. The selection strategy is an essential part of the research plan, but there is no federal mandate for it. |
Which of the following is true regarding the reporting of research results? A delay in reporting research results is not allowed by the U.S. government. | Clear specification of the methods and procedures used is essential. Clear specification of the methods and procedures used is essential. Details of study design and execution, including data selected or excluded, is typically a core requirement. |
Which of the following is true regarding data analysis? Data analysis methods should usually be specified in advance before a study begins. | Data analysis methods should usually be specified in advance before a study begins. In general, data analytic methods should be specified before any data are collected to avoid the impression of picking a method to achieve a desired result. Acceptable data analysis methods often vary depending on the field and the research context. |
Which of the following is true regarding an acknowledgments section? The contributions of technicians and other researchers are often listed in the acknowledgments section if they do not meet all of the criteria for authorship. | The contributions of technicians and other researchers are often listed in the acknowledgments section if they do not meet all of the criteria for authorship. Acknowledgments are usually for giving credit to sponsors and others who were involved with a project but who do not meet all of the requirements of an author. |
Which of the following is an example of plagiarism? Listing someone as an author who did not actually contribute to the publication. | Presenting someone else’s ideas or words and claiming them as one’s own. Plagiarism involves presenting someone else’s ideas or words and claiming them as one’s own. |
Which author is normally responsible for sharing reprints of a publication with readers? The corresponding author. | The corresponding author. The corresponding author is normally responsible for sharing reprints of a publication with readers. |
Which of the following is a responsibility of each author? Performing the data analysis. | Confirming that data have been accurately presented. Along with other responsibilities, each author should confirm that data have been accurately presented. |
Which of the following statements is true regarding the International Committee of Medical Journal Editors (ICMJE) guidelines? The first author is the only person that is held publicly responsible for the contents of the paper. | Individuals who do not meet the criteria for authorship but who have made a noteworthy contribution are normally listed in the acknowledgments section. Authors must make significant contributions to the research. In general, contributors who do not meet the criteria for authorship should, with their consent, be listed in the acknowledgments section. |
Which of the following statements is true regarding the responsibilities of reviewers? Reviewers can make use of the information in a manuscript before it is published, giving them an advantage over competitors. | … |
Which of the following statements is true regarding the regulations that govern research? | U.S. funded research collaborations are often governed by U.S. regulations no matter where the research takes place. |
The National Research Act of 1974 Identified the basic ethical principles of human subjects research. | Established the National Commission. |
IRB continuing review of a greater than minimal risk approved protocol that is currently enrolling subjects must: Include copies of all signed consent forms. | Occur at least annually. |
Ethics Training - Subjecto.com (2023)
Videos
1. Business ethics course - Session 1
(TepperCMU)
2. Full Semester Ethics Course *Condensed* into One Lecture
(Jeffrey Kaplan)
3. Annual Ethics Training in the COVID-19 Era
(OGE Institute for Ethics in Government)
4. Intro to Aristotle's Ethics | Lecture 1: The Good
(Hillsdale College)
5. Ethics in the Workplace - A Good Work Ethic
(Global Ethics Solutions)
6. Engineering Ethics Course Part 5 - Conclusion
(Blue Elephant Consulting)
Top Articles
Situational awareness: What it is and why it matters as a management tool | CQ Net - Management skills for everyone
Top 7 SEO Keyword Research Tools For Agencies
Create an Azure Data Factory using REST API - Azure Data Factory
How Does the Color Green Make You Feel?
EGO's 14-inch 56V electric chainsaw preps you for spring at $219 in New Green Deals
Apartments for Rent in Utrecht
Arancini (Italiaanse risotto balletjes) | Eef Kookt Zo
Latest Posts
die Waffen strecken - Deutsch-Englisch Übersetzung
Internationalisering: feiten en cijfers | Nuffic
Verslag studiereis Finland - PDF Free Download
Studiereis Finland: Helsinki, Lapland en Turku - PDF Free Download
Een inspirerende studiereis naar Finland. Wat neem je daarvan mee naar huis?
Article information
Author: Greg Kuvalis
Last Updated: 17/05/2023
Views: 6001
Rating: 4.4 / 5 (55 voted)
Reviews: 94% of readers found this page helpful
Author information
Name: Greg Kuvalis
Birthday: 1996-12-20
Address: 53157 Trantow Inlet, Townemouth, FL 92564-0267
Phone: +68218650356656
Job: IT Representative
Hobby: Knitting, Amateur radio, Skiing, Running, Mountain biking, Slacklining, Electronics
Introduction: My name is Greg Kuvalis, I am a witty, spotless, beautiful, charming, delightful, thankful, beautiful person who loves writing and wants to share my knowledge and understanding with you.