COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Confidentiality of a participant is best exemplified in which of the following actions?
|
Asking the participant to write his or her name in the questionnaire
|
|
Not mentioning his or her name in the Participants of the Study section
|
|
Introducing himself or herself in an interview
|
|
Taking his or her picture and placing it in the appendix
|
Explanation:
Detailed explanation-1: -Consent. Secondary Use of Existing Data. Identifiers. Data Storage.
There is 1 question to complete.