Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

please answer all the parts of the question within 30 minutes. make sure the explanation and reasons are explained in very detailed manner as in

please answer all the parts of the question within 30 minutes. make sure the explanation and reasons are explained in very detailed manner as in why the option is correct and why other options sre incorrect give reasons for the same , Attempt the answer only if your are 100% sure that its correct. else leave it for other tutor otherwise i will give negative ratings and will also report your answer for unprofessionalism. Make sure the answer is 100% correct and is not copied from anywhere. ATTEMPT THE QUESTION ONLY IF YOU ARE 100% CORRECT AND SURE. ELSE LEAVE IT FOR ANOTHER TUTOR. BUT PLEASE DONT PUT WRONG ANSWER ELSE I WILL REPORT.

image text in transcribed
Question 1 What is a risk of utilizing a single mobile device repeatedly with multiple participants across one study? The device is unusable after the first participant uses it for the study. The device software slows down after the first participant uses it for the study. Participants must return the device at the end of the study. Loose data security controls could result in a breach of confidentiality if the device is not erased between uses. Question 2 Why do custom-built, homegrown, and/or investigational technologies pose the greatest risk to research participants? Because they are not available to purchase. Because their use is considered deceptive Because researchers cannot know all the potential risks until participants have used the technology in practice Because their use is considered limited. Question 3 When would an IRB consider the risks of a study to be controlled? When there is an appropriate plan to remove all risks of harm. When risk mitigation strategies only consider harms encountered in daily life. When there is an appropriate risk mitigation and management plan in place. When the risks of harm are unacceptable. Question 4 Data lifecycle management refers to what? Review of all the data when the study has concluded The destruction plan for all research data collected during a study The creation of named file coding in preparation for data collection The ongoing oversight of research data by the researchers for the study's duration Question 5 What is a data safety monitoring plan (DSMP)? A DSMP is a document that lists all the technologies in the study and describes how safe they are. A DSMP is a report submitted to the IRB when a breach of confidentiality occurs. A DSMP is a living document that changes based on serious adverse events reported to the sponsor. A DSMP is a plan written by the researcher that ensures the safety of research participants and protects study data integrity

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Business Research Methods

Authors: Emma Bell, Bill Harley, Alan Bryman

5th Edition

0198809875, 9780198809876

More Books

Students also viewed these General Management questions

Question

=+b) Would you use this model? Explain.

Answered: 1 week ago

Question

What was the positive value of Max Weber's model of "bureaucracy?"

Answered: 1 week ago

Question

Wear as little as possible

Answered: 1 week ago

Question

Be relaxed at the hips

Answered: 1 week ago