#1
Which of the following is an example of unethical behavior in research?
Falsifying data to support a hypothesis
ExplanationManipulating data for personal gain violates research integrity.
#2
What does the acronym HIPAA stand for in the context of information security?
Health Insurance Portability and Accountability Act
ExplanationHIPAA regulates the protection of medical information.
#3
Which of the following is NOT an example of sensitive data?
Publicly available information
ExplanationPublicly available data doesn't require protection as sensitive data does.
#4
What is the primary purpose of an Institutional Review Board (IRB) in research?
To ensure compliance with ethical standards
ExplanationIRBs oversee research to protect participants' rights and welfare.
#5
In the context of information security, what does 'phishing' refer to?
A type of social engineering attack
ExplanationPhishing involves tricking users to reveal sensitive information.
#6
What is the purpose of obtaining informed consent from research participants?
To protect participants' autonomy and rights
ExplanationInformed consent ensures participants make voluntary, informed decisions.
#7
Which of the following is NOT a common method of protecting sensitive data?
Regularly sharing data on public forums
ExplanationSharing sensitive data publicly exposes it to unauthorized access.
#8
What is the role of a Data Protection Officer (DPO) in an organization?
To ensure compliance with data protection regulations
ExplanationDPOs oversee data protection practices to comply with laws.
#9
Which of the following is NOT a common component of an effective data protection policy?
Sharing sensitive data publicly
ExplanationPublicly sharing sensitive data contradicts protection efforts.
#10
Which of the following is a fundamental principle of ethical research conduct?
Confidentiality
ExplanationProtecting participants' privacy is vital for ethical research.
#11
What is the concept of 'least privilege' in information security?
Providing access only to the resources necessary to perform their tasks
ExplanationGranting minimum access rights reduces security risks.
#12
Which of the following is an example of a breach of research integrity?
Fabricating data to support desired outcomes
ExplanationFabricating data undermines the credibility of research.
#13
What is the 'principle of proportionality' in research ethics?
Ensuring that the benefits of the research outweigh its risks
ExplanationResearch should balance risks and benefits to participants.
#14
Which of the following is NOT a principle of the Belmont Report, which outlines ethical guidelines for research involving human subjects?
Informed consent
ExplanationInformed consent is a core principle of the Belmont Report.
#15
Which of the following is a best practice for ensuring research transparency?
Sharing research protocols and raw data
ExplanationTransparency enhances research credibility by sharing methodology and data.