Author Question: In a study of outpatients experiencing panic attacks, a researcher was working in a busy clinic ... (Read 64 times)

littleanan

  • Hero Member
  • *****
  • Posts: 575
In a study of outpatients experiencing panic attacks, a researcher was working in a busy clinic waiting room and left his computer to consent a new study participant.
 
  A transcription of a patient interview was displayed, and at the end of the transcription was the patient's medical record number and a list of medications currently taken. The researcher had not closed down the screen, and when he returned to his computer, he found an adult patient playing a video game on the computer. This best describes an example of a violation of which of the following human rights?
  a. Protection from the harm of exposure
  b. Security
  c. Confidentiality
  d. Privacy

Question 2

A researcher working for Google collects data on fair treatment in the workplace.
 
  He attempts to attach one of the raw data forms to a message to himself, so that he can finish the data analysis at home that evening, but accidentally sends it to another employee who had provided data for the study. The two employees, coincidentally, have an identical opinion about fair treatment in the workplace. This best describes an example of a violation of which of the following human rights?
  a. Confidentiality
  b. Fair treatment
  c. Protection from harm
  d. None of theseno ethical violation occurred, because the two subjects share a point of view.



carolinefletcherr

  • Sr. Member
  • ****
  • Posts: 313
Answer to Question 1

ANS: D
Privacy is an individual's right to determine the time, extent, and general circumstances under which personal information will be shared with or withheld from others. This information consists of one's attitudes, beliefs, behaviors, opinions, and records. The Privacy Act of 1974 provided the initial protection of an individual's privacy. Because of this act, data collection methods were to be scrutinized to protect subjects' privacy, and data cannot be gathered from subjects without their knowledge. Individuals also have the right to access their records and to prevent access by others. The intent of this act was to prevent the invasion of privacy that occurs when private information is shared without an individual's knowledge or against his or her will. Invading an individual's privacy might cause loss of dignity, friendships, or employment or create feelings of anxiety, guilt, embarrassment, or shame. The HIPAA Privacy Rule expanded the protection of an individual's privacy, specifically his or her protected individually identifiable health information, and described the ways in which covered entities can use or disclose this information. De-identifying health data involves removing 18 elements that could be used to identify an individual. An important one on this list is the individual's medical record number. In the example, the researcher's use of an actual patient identification number on a transcription risks the human right to privacy; a code number should have been used instead.

Answer to Question 2

ANS: A
Confidentiality is the researcher's management of private information shared by a subject that must not be shared with others without the authorization of the subject. In the example, sending one research subject the raw data of a different subject is a direct breach of confidentiality. A breach in confidentiality can occur when a researcher, by accident or direct action, allows an unauthorized person to gain access to raw study data. The right to fair treatment is based on the ethical principle of justice. This principle holds that each person should be treated fairly and should receive what he or she is due or owed. The right to protection from discomfort and harm is based on the ethical principle of beneficence, which holds that one should do good and, above all, do no harm.



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

A seasonal flu vaccine is the best way to reduce the chances you will get seasonal influenza and spread it to others.

Did you know?

Though newer “smart” infusion pumps are increasingly becoming more sophisticated, they cannot prevent all programming and administration errors. Health care professionals that use smart infusion pumps must still practice the rights of medication administration and have other professionals double-check all high-risk infusions.

Did you know?

According to the Migraine Research Foundation, migraines are the third most prevalent illness in the world. Women are most affected (18%), followed by children of both sexes (10%), and men (6%).

Did you know?

Patients who have been on total parenteral nutrition for more than a few days may need to have foods gradually reintroduced to give the digestive tract time to start working again.

Did you know?

Cyanide works by making the human body unable to use oxygen.

For a complete list of videos, visit our video library