1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
3 years ago
11

A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.

Direct identifiers will not be collected; however, IP addresses may be present in the data set. Risk of harm should be evaluated by: Solely by the magnitude or severity of expected harm.
Computers and Technology
2 answers:
Sunny_sXe [5.5K]3 years ago
8 0

There are two important things that should be considered when assessing the risk of harm in a research study, the risk of the severity of harm and the probability of harm.  In the probability of harm, there is a possibility that not all harms are possible in the research study.

<h3>Further Explanation</h3>

However, the level of risk of harm in a study is determined by how these two elements occurred during the study. From the scenario painted in the research study, the probability that the subject in the research can be identified is very low while the probability that the research will poses a greater risk to the individual subject is very high.

A risk in a research can be described as the probability of harm that can happen to a research subject as a result of participation in a research study. Injury or harm could be physical, psychological, social or economic. The probability and magnitude of possible harm or injury vary. It can be from minimal to significant. However, the federal regulations only define Minimal risks.

Minimal Risks: a risk is said to be minimal when the probability or magnitude of harm or injury expected in a research study are not on the high side or not greater.  

LEARN MORE:

  • research study brainly.com/question/11656305

KEYWORDS:

  • research study
  • harm
  • injury
  • subject
  • minimal risks
finlep [7]3 years ago
5 0

The answer is already given at the end of the question; solely by the magnitude or severity of expected harm

When assessing risks of harm associated with participation in a research study, the probability of harm and the risk of the severity of harm are two distinctive elements of risk that must be considered. In probability of harm, the fact that not all possible harms are equally probable should be considered. How these two elements occur is a crucial factor in determining the level of risk of harm in a study. Given the sensitivity of the information in the case scenario above, the probability that an individual subject could be identified is low while the magnitude of the possible risk of harm is high.


You might be interested in
How to move files and folders from desktop in w10?
Oksana_A [137]
Press CTRL + X to cut the file(s) and folder(s) you wish to move from your desktop.

Go to your destination (where you would like to move them to), and press CTRL + V to paste them there.
4 0
3 years ago
Need Help ASAP!
jonny [76]

Answer:

Ask about next steps and the best way to communicate.

Send a follow-up email within 24 hours.

Explanation:

3 0
3 years ago
Read 2 more answers
Please help me excel questions!​
Elenna [48]

Answer:

hi,hi,hi,hi,hi,hi,hi,hi,hi,hi,hi,hi,hi

7 0
2 years ago
Read 2 more answers
The term ________________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, se
Vinvika [58]

Answer:

The term "Local storage"denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term "hosted storage," "Internet storage" or "cloud storage." denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network

4 0
3 years ago
Read 2 more answers
What is a programming method that provides for interactive modules to a website?
Veseljchak [2.6K]

Answer:

Java?

Explanation:

8 0
3 years ago
Other questions:
  • Adam discovers a virus on his system that is using encryption to modify itself. the virus escapes detection by signature-based a
    14·1 answer
  • What concerns do you need to have with individuals hacking your information, computer, personal devices, and car? How can you pr
    5·1 answer
  • Customers access the internet through what usually for a monthly fee
    14·1 answer
  • What was the first fully computer animated feature film?
    13·1 answer
  • What is the standard internet protocol, which provides the technical foundation for the public internet?
    9·1 answer
  • The purpose of the 3030 gas dehydration unit
    11·1 answer
  • PLEASE HURRY!!!
    11·1 answer
  • Which type of infrastructure service stores and manages corporate data and provides capabilities for analyzing the data
    12·1 answer
  • Which statements about editing an existing Contact in Outlook are true? Check all that apply.
    9·2 answers
  • Explain the evolution of programming language​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!