Author Question: In a study of outpatients experiencing panic attacks, a researcher was working in a busy clinic ... (Read 65 times)

littleanan

  • Hero Member
  • *****
  • Posts: 575
In a study of outpatients experiencing panic attacks, a researcher was working in a busy clinic waiting room and left his computer to consent a new study participant.
 
  A transcription of a patient interview was displayed, and at the end of the transcription was the patient's medical record number and a list of medications currently taken. The researcher had not closed down the screen, and when he returned to his computer, he found an adult patient playing a video game on the computer. This best describes an example of a violation of which of the following human rights?
  a. Protection from the harm of exposure
  b. Security
  c. Confidentiality
  d. Privacy

Question 2

A researcher working for Google collects data on fair treatment in the workplace.
 
  He attempts to attach one of the raw data forms to a message to himself, so that he can finish the data analysis at home that evening, but accidentally sends it to another employee who had provided data for the study. The two employees, coincidentally, have an identical opinion about fair treatment in the workplace. This best describes an example of a violation of which of the following human rights?
  a. Confidentiality
  b. Fair treatment
  c. Protection from harm
  d. None of theseno ethical violation occurred, because the two subjects share a point of view.



carolinefletcherr

  • Sr. Member
  • ****
  • Posts: 313
Answer to Question 1

ANS: D
Privacy is an individual's right to determine the time, extent, and general circumstances under which personal information will be shared with or withheld from others. This information consists of one's attitudes, beliefs, behaviors, opinions, and records. The Privacy Act of 1974 provided the initial protection of an individual's privacy. Because of this act, data collection methods were to be scrutinized to protect subjects' privacy, and data cannot be gathered from subjects without their knowledge. Individuals also have the right to access their records and to prevent access by others. The intent of this act was to prevent the invasion of privacy that occurs when private information is shared without an individual's knowledge or against his or her will. Invading an individual's privacy might cause loss of dignity, friendships, or employment or create feelings of anxiety, guilt, embarrassment, or shame. The HIPAA Privacy Rule expanded the protection of an individual's privacy, specifically his or her protected individually identifiable health information, and described the ways in which covered entities can use or disclose this information. De-identifying health data involves removing 18 elements that could be used to identify an individual. An important one on this list is the individual's medical record number. In the example, the researcher's use of an actual patient identification number on a transcription risks the human right to privacy; a code number should have been used instead.

Answer to Question 2

ANS: A
Confidentiality is the researcher's management of private information shared by a subject that must not be shared with others without the authorization of the subject. In the example, sending one research subject the raw data of a different subject is a direct breach of confidentiality. A breach in confidentiality can occur when a researcher, by accident or direct action, allows an unauthorized person to gain access to raw study data. The right to fair treatment is based on the ethical principle of justice. This principle holds that each person should be treated fairly and should receive what he or she is due or owed. The right to protection from discomfort and harm is based on the ethical principle of beneficence, which holds that one should do good and, above all, do no harm.



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Street names for barbiturates include reds, red devils, yellow jackets, blue heavens, Christmas trees, and rainbows. They are commonly referred to as downers.

Did you know?

About 80% of major fungal systemic infections are due to Candida albicans. Another form, Candida peritonitis, occurs most often in postoperative patients. A rare disease, Candida meningitis, may follow leukemia, kidney transplant, other immunosuppressed factors, or when suffering from Candida septicemia.

Did you know?

Critical care patients are twice as likely to receive the wrong medication. Of these errors, 20% are life-threatening, and 42% require additional life-sustaining treatments.

Did you know?

Approximately 70% of expectant mothers report experiencing some symptoms of morning sickness during the first trimester of pregnancy.

Did you know?

Approximately 500,000 babies are born each year in the United States to teenage mothers.

For a complete list of videos, visit our video library