Description
2-3 references. table 7.3 is attached! Due on Wednesday morning...
Unformatted Attachment Preview
Although the official definition focuses
on a desco
STUDIES
agreement that research misconduct covers many
other issues including improprieties of authorship,
poor data management, conflicts of interest, inap-
propriate financial arrangements, failure to comply
with governmental regulations, and unauthorized
use of confidential information.
Research integrity is an important concern
in nursing. Jeffers and Whittemore (2005), for
example, engaged in work to identify and describe
were pocty voluntary
unobtrusively).
In thinking about
example, if a study
BOX 7.3. Guidelines for Critiquing the Ethical Aspects of a Study
CRITIQUING THE
three types of misconduct, there is widespread
ETHICS OF RESEARCH
be sufficine informatie
whether per bicipants were
Guidelines for critiquing ethical aspects of a steel
comfort.ports do not
are present BK 7.3. Members of an ethi
whether tormed conse
committer hand or provided with sufficient in
shouldert to situatic
formation to LRT all these questions. Researt
not have been gathered a
journal and decrever, do not always include
also consider who the
a
there should be more
procedures. You mis
1. Was the study approved and monitored by an Institutional Review Board, Research Ethics Board, or
psychological distress? Did the
3. Did the benefits to participants outweigh any potential risks or actual discomfort they experienced?
Did the benefits to society outweigh the costs to participants?
4. Was any type of coercion or undue influence used to recruit participants? Did they have se right to
refuse to participate or to withdraw without penalty?
5. Were participants deceived in any way? Were they fully aware of participating in a stucy and did
they understand the purpose and nature of the research?
6. Were appropriate informed consent procedures used? If not, were there valid and justifiable
reasons?
og
7. Were adequate steps taken to safeguard participants' privacy? How was confidentiality maintained?
Were Privacy Rule procedures followed (if applicable)? Was a Certificate of Confidentiality
obtained? If not, should one have been obtained?
8. Were vulnerable groups involved in the research? If yes, were special precautions used because of
their vulnerable status?
for being “s
9. Were groups omitted from the inquiry without a justifiable rationale, such as women (or men), minori-
two viewpo
ask one per
ties, or older people?
given conf
the other.
other similar ethics review committee?
2. Were participants subjected to any physical harm, discomfort, or
researchers take appropriate steps to remove, prevent, or minimize harm?
the study participan
has been considera
of certain groups
research.
It is often dif
participants' priv
researcher ment
anonymity. As
arises when dat
multaneously (
who are jointl
and Henderso
two people is
viewed about
interviewed
Purchase answer to see full attachment
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Just what I needed…Fantastic!
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Cuyamaca College Jump Rope Routine Challenging Exercise Worksheet
Link (Links to an external site.)Jump Rope - 10's is a jump rope routine that we practiced last week. Please refer to las ...
Cuyamaca College Jump Rope Routine Challenging Exercise Worksheet
Link (Links to an external site.)Jump Rope - 10's is a jump rope routine that we practiced last week. Please refer to last weeks page on Jump Rope 10's if you need a reference to the particular exercises.Your assignment is to complete Jump Rope - 10's again this week. I want you to give me feedback on what you thought about this jump rope routine. Simply cut and paste these questions and attach your answers. How hard was it for you? Have you completed a jump rope routine like this before? If so, what are the differences and similarities? What level do you think you are (beginner, intermediate, advanced)? What exercises were easy and which were hard for you? How did this jump rope routine make you feel?
3 pages
A Contemporary Moral Issue In Our Society
Moral issues in society can be analyzed in the radar of the various ethical issues. Examples of moral issues in modern soc ...
A Contemporary Moral Issue In Our Society
Moral issues in society can be analyzed in the radar of the various ethical issues. Examples of moral issues in modern society include, among others; ...
DeVry University Official Bribery and Commercial Bribery Discussion
1. We know that many companies do business around the world, and may encounter many different cultures, norms, and legal s ...
DeVry University Official Bribery and Commercial Bribery Discussion
1. We know that many companies do business around the world, and may encounter many different cultures, norms, and legal structures as a result. How should a company conduct itself when foreign laws and/or norms are different than U.S. laws? For example, bribery may be an acceptable business practice in some countries, even though it is illegal here in the U.S. How do you think this type of situation should be handled? 2.Monday – Kick off Topic 2: Kickback SchemesClass….. Let me get us started:Kickback schemes – consist of undisclosed payments made by vendors to employees of purchasing companies.involve collusion between employees and vendorsalmost always attack the purchasing function of the victim companyDiverting business to vendors – Most bribery schemes end up as overbilling schemes even if they do not start that way, because once a vendor knows it has an exclusive purchasing arrangement, it ultimately will raise prices to cover the cost of the kickback.QUESTION 1: Offering a payment can constitute a bribe, even if the illegal payment is never actually made. Why?I look forward to everyone’s active participation this week!Make sure that you cite your references and use quotations if necessary. Try to paraphrase as much as you can. 3.Tuesday – Overbilling SchemesClass….. Great topic this week to get us started.Overbilling schemesEmployees with approval authority – the ability to authorize purchases is key to a kickback schemeFraudsters lacking approval authority – need to be able to circumvent accounts payable controlsfiling a false purchase requisitionpreparing false voucherscreating a purchase order that corresponds to the vendor’s fraudulent invoiceQUESTION 1: What is the common ingredient shared by the four classifications of corruption?QUESTION 2: What is the difference between official bribery and commercial bribery?
5 pages
Misleading Statistics
Misleading statistics are becoming the most complained issues in the world. Ranging from advertisement, politics, and so o ...
Misleading Statistics
Misleading statistics are becoming the most complained issues in the world. Ranging from advertisement, politics, and so on, individuals and ...
Florida College GFCF Diets Discussion
General Overview: Use the attached article provided to you by your professor to critique. This assessment will help you re ...
Florida College GFCF Diets Discussion
General Overview: Use the attached article provided to you by your professor to critique. This assessment will help you recognize the value of research in applied behavior analysis and the value of supporting your claims with established views and research.
Next, based on your understanding of the article, answer the following questions that pertain to essential literature review elements:
What is the title of the article? Provide the citation for the article in APA format.
Explain how you determined the credibility of the research provided.
What is the purpose of the article? Discuss the rationale/review of literature. How did the literature reviewed support this study? Discuss the theoretical/conceptual framework and practical rationale given for why the researchers chose to do this particular study.
What is the hypothesis of the study? What claims do the authors make in the article?
What variables are being looked at? How are these factors assessed or measured in the article? Are the variables operationally defined?
What type of research design is used in the study? What instruments or measures did the researchers use to collect data? Discuss the methods in detail and discuss if the methods chosen are appropriate for the research question being investigated.
Discuss procedural fidelity, data collection, reliability, social validity, internal validity, summarize visual analysis and types of statistics used, weaknesses and limitations.
Discuss the results, discussion and if the article was conducted in an ethical manner.
AMU Terrorism in Egypt Spiking Oil Prices Civil War in Sudan & Nuclear Weapons Essay
Assignment InstructionsThe assignment is not a paper, but a project. The purpose of this assign ...
AMU Terrorism in Egypt Spiking Oil Prices Civil War in Sudan & Nuclear Weapons Essay
Assignment InstructionsThe assignment is not a paper, but a project. The purpose of this assignment is for you to demonstrate not your analytic ability (for you should be able at this point to do the appropriate thinking) but rather your ability to set up a problem, identify what you need, and how you would solve the problem using a structured method. You are given a list of 7 intelligence questions and you are expected to respond to 4 of them for this project. Your submission should be in table form and not exceed two pages per intelligence problem. Each table should list the primary intelligence problem (given below). In your table you must break down the primary problem into its components, then listing Priority Intelligence Requirements (PIRs) / Essential Elements of Information (EEIs) for each component question. PIRs may be considered "general statements of intelligence need" or generalized questions about the operating environment (Curtis E. Lemay Center 2015). The PIRs should then be the driving force for your more specific EEIs. You should identify the analytic methods you would recommend using to analyze the information to answer the overall question. Finally you need to explain why those methods are appropriate.Your submission will be graded using the following rubric (see rubric chart below): 1) break the intelligence problem into component questions, 2) articulate Priority Intelligence Requirements and Essential Elements of Information, 3) identify intelligence analysis methods that you recommend to address the problems (based on the type of information you identify and the nature of the question), 4) provide a textual explanation of why you chose the methods you did and what you can expect by using the methods, 5) completion of 1-4 above for 4 of the 7 problems listed below, and 6) demonstration that you have read, understood, and used the required readings (NOTE: any submission which does not pursue the purpose of this assignment--structuring an intelligence question for analysis--will be considered "off-topic" and will assessed a zero). A few important thoughts: 1) No one method can stand alone as an adequate method. It takes looking at the problem from more than one approach to get a meaningful view of the solution to the problem. You should list the methods that you would recommend and in a few words identify what the method would achieve. (You may choose whatever format you think works best to communicate these ideas.) Further, the questions below are broad and general. If you need to make assumptions to help you address each problem please document your assumptions (this is more important than you may at first think). 2) Feel free to draw on any method you are aware of and if you have questions on this please reach out, that's what I'm here for. If you are concerned that I may not recognize your method, please provide a footnote explaining. 3) It is not possible to list all PIRs/EEIs so it is impossible to be complete given the time available for this assignment. However, I will evaluate your selection of component intelligence questions, intelligence requirements, and the centrality of the methods you recommend to addressing the core nature of the problem. 4) Be sure that it is clear which methods address which subproblems. For example: Problem: The US has become aware that the Pakistanis have provided missile technology to Yemen. This point is confirmed. However, it is unclear what the Yemenis are intending to do with the technology. What is the outlook for this development? Subproblems: What technology was transferred? What threats does this pose to the region, and does this change the regional balance of power? What is the likelihood that Yemen will reexport this technology to substate groups or states that pose a threat to US interests? List associated PIRs/EEIsThen identify what methods you would use to answer the problem and subproblems and explain why these methods are the best and most appropriate to answer the questions(!). You must select 4 out of the following 7 problems to address for this assignment: 1) A recent wave of terrorism in Egypt is threatening the stability of the central government. What does this mean? 2) Oil prices have spiked and Chinese companies have obtained operations and engineering contracts in multiple Persian Gulf states. What is the likelihood of Chinese intervention in the Persian Gulf to ensure the supply of oil to China? 3) The Brazilians have been working with Chinese engineers to design and field a new satellite system, suspected to be of military significance. What is this new satellite system? 4) The civil war in Sudan is raging and it looks increasingly likely that an even more extremist leader, a known supporter of al-Qaeda, is coming to power. The new regime is both virulently anti-American and expansionist, talking about Somalia, Egypt, and exporting its beliefs. What does this mean for the US? 5) Killings and kidnappings on the US-Mexican border have escalated, spilling over into the US. More than 2 dozen Americans have been kidnapped in California and taken to Mexico in the last year (incidentally this fact is true) and have either been held or executed. Running gun battles between drug cartels have escalated. The drug cartels are using IEDs (in fact this has not yet come to pass--but for the sake of this example we will accept it as fact), automatic weapons, and grenades. The government is unable to control the violence and thousands of Mexican troops and police patrol the border cities. Dozens of people are killed every month in what has become open warfare. What does this mean for US security? 6) The Israelis destroyed a suspected nuclear weapons facility in Syria. Was it really a nuclear weapons facility? What does this mean for non-proliferation efforts. 7) Iranian interference in domestic Iraqi politics and security is on the rise. Iranian bomb components, weapons, propaganda, and personnel are increasingly crossing the boarder into Iraq. What does this mean for the domestic Iraqi security situation.
Similar Content
Purdue University Global Description of Chemical Reactions and Equations Discussion
imagine that you see an oxygen atom and two hydrogen atoms.Will a compound form between the oxygen atom and the two hydrog...
Cumberlands Wk15 Importance Information Management System Discussion Paper
How is Management Information System Useful in Companies?Your research paper should be at least 3 pages (800 words), doub...
African American leader whom we have studied and carefully construct an argument
Take one African American leader whom we have studied and carefully construct an argument for why that person was successf...
a term paper about Chinese agriculture history.
looking for someone familiar with Chinese agriculture history. the topic is about The agricultural revolution of the Tang-...
UMUC Systems Development Life Cycle and Protecting Confidentiality Paper
Please review and reword the attached paper for plagiarism Select the best methods and techniques for protecting confident...
Making Ethical Choices
As you watched the video, in your opinion, were characters in the scenario demonstrating unethical behavior? If so, what w...
Machiaveli
Dear responsible friend, hope you’ve been well. Being an ethical person and having an interest in joining the TX politic...
Mrya 402
Reflection Essay: Comparison between Böröcz's and Zielonka's Visions of the EU as Reflection Essay: Comparison between B...
Storytelling..
Humans have transferred information since ancient times through storytelling and creation of fictions to explain difficult...
Related Tags
Book Guides
Twilight
by Stephenie Meyer
Crime and Punishment
by Fyodor Dostoyevsky
A Farewell To Arms
by Ernest Hemingway
One Flew Over the Cuckoos Nest
by Ken Kesey
Crippled America
by Donald J Trump
Dandelion Wine
by Ray Bradbury
The Lord of the Flies
by William Golding
Sharp Objects
by Gillian Flynn
The President is Missing
by James Patterson, Bill Clinton
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Cuyamaca College Jump Rope Routine Challenging Exercise Worksheet
Link (Links to an external site.)Jump Rope - 10's is a jump rope routine that we practiced last week. Please refer to las ...
Cuyamaca College Jump Rope Routine Challenging Exercise Worksheet
Link (Links to an external site.)Jump Rope - 10's is a jump rope routine that we practiced last week. Please refer to last weeks page on Jump Rope 10's if you need a reference to the particular exercises.Your assignment is to complete Jump Rope - 10's again this week. I want you to give me feedback on what you thought about this jump rope routine. Simply cut and paste these questions and attach your answers. How hard was it for you? Have you completed a jump rope routine like this before? If so, what are the differences and similarities? What level do you think you are (beginner, intermediate, advanced)? What exercises were easy and which were hard for you? How did this jump rope routine make you feel?
3 pages
A Contemporary Moral Issue In Our Society
Moral issues in society can be analyzed in the radar of the various ethical issues. Examples of moral issues in modern soc ...
A Contemporary Moral Issue In Our Society
Moral issues in society can be analyzed in the radar of the various ethical issues. Examples of moral issues in modern society include, among others; ...
DeVry University Official Bribery and Commercial Bribery Discussion
1. We know that many companies do business around the world, and may encounter many different cultures, norms, and legal s ...
DeVry University Official Bribery and Commercial Bribery Discussion
1. We know that many companies do business around the world, and may encounter many different cultures, norms, and legal structures as a result. How should a company conduct itself when foreign laws and/or norms are different than U.S. laws? For example, bribery may be an acceptable business practice in some countries, even though it is illegal here in the U.S. How do you think this type of situation should be handled? 2.Monday – Kick off Topic 2: Kickback SchemesClass….. Let me get us started:Kickback schemes – consist of undisclosed payments made by vendors to employees of purchasing companies.involve collusion between employees and vendorsalmost always attack the purchasing function of the victim companyDiverting business to vendors – Most bribery schemes end up as overbilling schemes even if they do not start that way, because once a vendor knows it has an exclusive purchasing arrangement, it ultimately will raise prices to cover the cost of the kickback.QUESTION 1: Offering a payment can constitute a bribe, even if the illegal payment is never actually made. Why?I look forward to everyone’s active participation this week!Make sure that you cite your references and use quotations if necessary. Try to paraphrase as much as you can. 3.Tuesday – Overbilling SchemesClass….. Great topic this week to get us started.Overbilling schemesEmployees with approval authority – the ability to authorize purchases is key to a kickback schemeFraudsters lacking approval authority – need to be able to circumvent accounts payable controlsfiling a false purchase requisitionpreparing false voucherscreating a purchase order that corresponds to the vendor’s fraudulent invoiceQUESTION 1: What is the common ingredient shared by the four classifications of corruption?QUESTION 2: What is the difference between official bribery and commercial bribery?
5 pages
Misleading Statistics
Misleading statistics are becoming the most complained issues in the world. Ranging from advertisement, politics, and so o ...
Misleading Statistics
Misleading statistics are becoming the most complained issues in the world. Ranging from advertisement, politics, and so on, individuals and ...
Florida College GFCF Diets Discussion
General Overview: Use the attached article provided to you by your professor to critique. This assessment will help you re ...
Florida College GFCF Diets Discussion
General Overview: Use the attached article provided to you by your professor to critique. This assessment will help you recognize the value of research in applied behavior analysis and the value of supporting your claims with established views and research.
Next, based on your understanding of the article, answer the following questions that pertain to essential literature review elements:
What is the title of the article? Provide the citation for the article in APA format.
Explain how you determined the credibility of the research provided.
What is the purpose of the article? Discuss the rationale/review of literature. How did the literature reviewed support this study? Discuss the theoretical/conceptual framework and practical rationale given for why the researchers chose to do this particular study.
What is the hypothesis of the study? What claims do the authors make in the article?
What variables are being looked at? How are these factors assessed or measured in the article? Are the variables operationally defined?
What type of research design is used in the study? What instruments or measures did the researchers use to collect data? Discuss the methods in detail and discuss if the methods chosen are appropriate for the research question being investigated.
Discuss procedural fidelity, data collection, reliability, social validity, internal validity, summarize visual analysis and types of statistics used, weaknesses and limitations.
Discuss the results, discussion and if the article was conducted in an ethical manner.
AMU Terrorism in Egypt Spiking Oil Prices Civil War in Sudan & Nuclear Weapons Essay
Assignment InstructionsThe assignment is not a paper, but a project. The purpose of this assign ...
AMU Terrorism in Egypt Spiking Oil Prices Civil War in Sudan & Nuclear Weapons Essay
Assignment InstructionsThe assignment is not a paper, but a project. The purpose of this assignment is for you to demonstrate not your analytic ability (for you should be able at this point to do the appropriate thinking) but rather your ability to set up a problem, identify what you need, and how you would solve the problem using a structured method. You are given a list of 7 intelligence questions and you are expected to respond to 4 of them for this project. Your submission should be in table form and not exceed two pages per intelligence problem. Each table should list the primary intelligence problem (given below). In your table you must break down the primary problem into its components, then listing Priority Intelligence Requirements (PIRs) / Essential Elements of Information (EEIs) for each component question. PIRs may be considered "general statements of intelligence need" or generalized questions about the operating environment (Curtis E. Lemay Center 2015). The PIRs should then be the driving force for your more specific EEIs. You should identify the analytic methods you would recommend using to analyze the information to answer the overall question. Finally you need to explain why those methods are appropriate.Your submission will be graded using the following rubric (see rubric chart below): 1) break the intelligence problem into component questions, 2) articulate Priority Intelligence Requirements and Essential Elements of Information, 3) identify intelligence analysis methods that you recommend to address the problems (based on the type of information you identify and the nature of the question), 4) provide a textual explanation of why you chose the methods you did and what you can expect by using the methods, 5) completion of 1-4 above for 4 of the 7 problems listed below, and 6) demonstration that you have read, understood, and used the required readings (NOTE: any submission which does not pursue the purpose of this assignment--structuring an intelligence question for analysis--will be considered "off-topic" and will assessed a zero). A few important thoughts: 1) No one method can stand alone as an adequate method. It takes looking at the problem from more than one approach to get a meaningful view of the solution to the problem. You should list the methods that you would recommend and in a few words identify what the method would achieve. (You may choose whatever format you think works best to communicate these ideas.) Further, the questions below are broad and general. If you need to make assumptions to help you address each problem please document your assumptions (this is more important than you may at first think). 2) Feel free to draw on any method you are aware of and if you have questions on this please reach out, that's what I'm here for. If you are concerned that I may not recognize your method, please provide a footnote explaining. 3) It is not possible to list all PIRs/EEIs so it is impossible to be complete given the time available for this assignment. However, I will evaluate your selection of component intelligence questions, intelligence requirements, and the centrality of the methods you recommend to addressing the core nature of the problem. 4) Be sure that it is clear which methods address which subproblems. For example: Problem: The US has become aware that the Pakistanis have provided missile technology to Yemen. This point is confirmed. However, it is unclear what the Yemenis are intending to do with the technology. What is the outlook for this development? Subproblems: What technology was transferred? What threats does this pose to the region, and does this change the regional balance of power? What is the likelihood that Yemen will reexport this technology to substate groups or states that pose a threat to US interests? List associated PIRs/EEIsThen identify what methods you would use to answer the problem and subproblems and explain why these methods are the best and most appropriate to answer the questions(!). You must select 4 out of the following 7 problems to address for this assignment: 1) A recent wave of terrorism in Egypt is threatening the stability of the central government. What does this mean? 2) Oil prices have spiked and Chinese companies have obtained operations and engineering contracts in multiple Persian Gulf states. What is the likelihood of Chinese intervention in the Persian Gulf to ensure the supply of oil to China? 3) The Brazilians have been working with Chinese engineers to design and field a new satellite system, suspected to be of military significance. What is this new satellite system? 4) The civil war in Sudan is raging and it looks increasingly likely that an even more extremist leader, a known supporter of al-Qaeda, is coming to power. The new regime is both virulently anti-American and expansionist, talking about Somalia, Egypt, and exporting its beliefs. What does this mean for the US? 5) Killings and kidnappings on the US-Mexican border have escalated, spilling over into the US. More than 2 dozen Americans have been kidnapped in California and taken to Mexico in the last year (incidentally this fact is true) and have either been held or executed. Running gun battles between drug cartels have escalated. The drug cartels are using IEDs (in fact this has not yet come to pass--but for the sake of this example we will accept it as fact), automatic weapons, and grenades. The government is unable to control the violence and thousands of Mexican troops and police patrol the border cities. Dozens of people are killed every month in what has become open warfare. What does this mean for US security? 6) The Israelis destroyed a suspected nuclear weapons facility in Syria. Was it really a nuclear weapons facility? What does this mean for non-proliferation efforts. 7) Iranian interference in domestic Iraqi politics and security is on the rise. Iranian bomb components, weapons, propaganda, and personnel are increasingly crossing the boarder into Iraq. What does this mean for the domestic Iraqi security situation.
Earn money selling
your Study Documents