1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
4 years ago
11

A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.

Direct identifiers will not be collected; however, IP addresses may be present in the data set. Risk of harm should be evaluated by: Solely by the magnitude or severity of expected harm.
Computers and Technology
2 answers:
Sunny_sXe [5.5K]4 years ago
8 0

There are two important things that should be considered when assessing the risk of harm in a research study, the risk of the severity of harm and the probability of harm.  In the probability of harm, there is a possibility that not all harms are possible in the research study.

<h3>Further Explanation</h3>

However, the level of risk of harm in a study is determined by how these two elements occurred during the study. From the scenario painted in the research study, the probability that the subject in the research can be identified is very low while the probability that the research will poses a greater risk to the individual subject is very high.

A risk in a research can be described as the probability of harm that can happen to a research subject as a result of participation in a research study. Injury or harm could be physical, psychological, social or economic. The probability and magnitude of possible harm or injury vary. It can be from minimal to significant. However, the federal regulations only define Minimal risks.

Minimal Risks: a risk is said to be minimal when the probability or magnitude of harm or injury expected in a research study are not on the high side or not greater.  

LEARN MORE:

  • research study brainly.com/question/11656305

KEYWORDS:

  • research study
  • harm
  • injury
  • subject
  • minimal risks
finlep [7]4 years ago
5 0

The answer is already given at the end of the question; solely by the magnitude or severity of expected harm

When assessing risks of harm associated with participation in a research study, the probability of harm and the risk of the severity of harm are two distinctive elements of risk that must be considered. In probability of harm, the fact that not all possible harms are equally probable should be considered. How these two elements occur is a crucial factor in determining the level of risk of harm in a study. Given the sensitivity of the information in the case scenario above, the probability that an individual subject could be identified is low while the magnitude of the possible risk of harm is high.


You might be interested in
A computer has dose not have ___________
Ksivusya [100]

Answer:

A computer does not have brain of its own

4 0
3 years ago
Read 2 more answers
On the Format tab, in the Shape Styles group, there is the option to change the _____. a. Shape Effects b. Shape Fill c. Shape O
makvit [3.9K]
Hey there! Hello!

The answer to this problem will be D, "All Of The Above." I've attached a picture that shows the Shape Format tab in Microsoft Word. You can see in the dropdown that there's options for all three of your listed choices: Shape Fill, Shape Outline, and Shape Effects. 

I hope this helped you out! Feel free to ask me any additional questions if you have any. :-)

6 0
3 years ago
Choose all the items that represent potential ways to find a job opening.
NeX [460]

Answer:

company website

Explanation:

4 0
3 years ago
write a function that given an integer Y and 3 non-empty string A,B,W, denotingthe year of vacations, the beginning month, the e
chubhunter [2.5K]

Answer:un spain please

Explanation:

4 0
3 years ago
To specify your preferred colors, fonts, and effects for a document, which of the following should be done?
Irina-Kira [14]

Answer: crest custom theme

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • What are the advantages of repeating a header row? check all that apply
    14·1 answer
  • Who are the founders of Microsoft?
    5·1 answer
  • what is it called when someone uses software to run multiple operating systems on one computer at the same time? A.functional vi
    9·1 answer
  • To print data sideways on a piece of paper, use the _______ page orientation setting.
    6·2 answers
  • Digital certificates can be used for each of these EXCEPT _____. A. to encrypt channels to provide secure communication between
    13·1 answer
  • My speaker on my phone is not working, when I try and play music and videos the sound dosen't work. However my alarm works. Can
    9·2 answers
  • Refer to the method f: Public int f( int k, int n ) { if( n == k ) return k; else if( n &gt; k ) return f( k, n - k ); else retu
    8·1 answer
  • One key feature of malware is that it:
    13·1 answer
  • What is a characteristic of high-level languages?
    15·1 answer
  • Where are 'if' and 'else' statements shown when printing a document in a word processor?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!