COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
talking to him or her privately
|
|
surprising him or her with a questionnaire
|
|
writing him or her a letter
|
|
using a padrino system
|
Detailed explanation-1: -Any participants to any research activity must not be forced to take part in the study. Informed consent for a participant is best exemplified in which of the following actions? Talking to him or her privately.
Detailed explanation-2: -Confidentiality represents an agreement that is formed between the researcher and participant, via the informed consent process, that ensures the participant’s identity, personal information, responses, etc. will not be disclosed to anyone outside of the research team unless otherwise agreed upon.
Detailed explanation-3: -Researchers must implement specific protections to minimize all forms of discomfort and harm to align with the principle of beneficence. Under the principle of beneficence, researchers must also protect participants from exploitation.