1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
4 years ago
11

A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.

Direct identifiers will not be collected; however, IP addresses may be present in the data set. Risk of harm should be evaluated by: Solely by the magnitude or severity of expected harm.
Computers and Technology
2 answers:
Sunny_sXe [5.5K]4 years ago
8 0

There are two important things that should be considered when assessing the risk of harm in a research study, the risk of the severity of harm and the probability of harm.  In the probability of harm, there is a possibility that not all harms are possible in the research study.

<h3>Further Explanation</h3>

However, the level of risk of harm in a study is determined by how these two elements occurred during the study. From the scenario painted in the research study, the probability that the subject in the research can be identified is very low while the probability that the research will poses a greater risk to the individual subject is very high.

A risk in a research can be described as the probability of harm that can happen to a research subject as a result of participation in a research study. Injury or harm could be physical, psychological, social or economic. The probability and magnitude of possible harm or injury vary. It can be from minimal to significant. However, the federal regulations only define Minimal risks.

Minimal Risks: a risk is said to be minimal when the probability or magnitude of harm or injury expected in a research study are not on the high side or not greater.  

LEARN MORE:

  • research study brainly.com/question/11656305

KEYWORDS:

  • research study
  • harm
  • injury
  • subject
  • minimal risks
finlep [7]4 years ago
5 0

The answer is already given at the end of the question; solely by the magnitude or severity of expected harm

When assessing risks of harm associated with participation in a research study, the probability of harm and the risk of the severity of harm are two distinctive elements of risk that must be considered. In probability of harm, the fact that not all possible harms are equally probable should be considered. How these two elements occur is a crucial factor in determining the level of risk of harm in a study. Given the sensitivity of the information in the case scenario above, the probability that an individual subject could be identified is low while the magnitude of the possible risk of harm is high.


You might be interested in
The second stage of digestion takes place in the small intestine. <br> True Or False?
DedPeter [7]
False. The second stage of digestion happens in the stomach.
8 0
3 years ago
Robert's got a quick hand
Alina [70]
verry
good
song
love
it
6 0
3 years ago
Read 2 more answers
Write a declaration of a variable named count that can be used to hold numbers like 90000 and -1 and -406.
Andreyy89
Which language? In Java it would simply be:

int count;
7 0
3 years ago
Choose the correct line of code.
Naddika [18.5K]
Def_pow_(self,b): if not then I’m sorry
5 0
3 years ago
Object-Oriented Programming (Using Java Language)
Delicious77 [7]

Answer:

import java.util.Scanner;

class Main {  

 public static void main(String args[]) {

       Scanner scan = new Scanner(System.in);

       System.out.print("Enter a decimal value (0 to 15): ");

       int num = scan.nextInt();

       scan.close();

       

       if (num < 0 || num >15) {

           System.out.printf("%d is an invalid input\n", num);

       } else {

           System.out.printf("The hex value is %X\n", num);

       }

 }

}

Explanation:

Hopefully this example will get you going for the other assignments.

3 0
3 years ago
Other questions:
  • Tom wants a way to automatically create ads and simplify campaign management, using his resources and Google's machine learning
    12·1 answer
  • The simplest method to copy information is to first select the information you want to copy, and then use the Copy button and th
    11·1 answer
  • This program will output a right triangle based on user specified height triangleHeight and symbol triangleChar. (1) The given p
    14·1 answer
  • A healthcare organization received notification that a hospital employee’s laptop that contained PHI was inadvertently left at a
    14·1 answer
  • Create a Python program that: Allows the user to enter a person's first name and last name. The user should be able to enter as
    12·1 answer
  • Each wireless network has its own name to identify it, known as service set identity. true false
    9·1 answer
  • WILL GIVE BRAINLIEST
    15·1 answer
  • What is the correct order of the phases of the software development process?
    14·1 answer
  • What are the five generations of computers?​
    13·1 answer
  • What is a sensitive compartmented information program
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!