What ethical issues arise when conducting research

Assignment Help Basic Computer Science
Reference no: EM131052083

Dr. Alucard conducted a study to examine various aspects of the sexual behaviors of college students. The students filled out a questionnaire in a classroom on the campus; about 50 students were tested at a time. The questionnaire asked about prior experience with various sexual practices. If a student had experience, a number of other detailed questions were asked. However, if the student did not have any prior experience, he or she skipped the detailed questions and simply went on to answer another general question about a sexual experience. What ethical issues arise when conducting research such as this? Do you detect any specific problems that might arise because of the "skip" procedure used in this study?

Reference no: EM131052083

Questions Cloud

Experiment work with other plant cells : 1. Did water flow in or out of the plant cells(potato cell)in each of the samples examined? How do you know this? 2. Would this experiment work with other plant cells? What about with animal cells? Why or why not?
Both parallel products and substitutes : A business that faces both parallel products and substitutes is likely to have a difficult time in the marketplace. Example of businesses that have both parallels and substitutes include grocery stores.
What are the rights of company a employees : What are the rights of Company A employees? Why are company A's employees so upset about a no compete contract? Have the rights of Company A's employees been violated?
Concentration of the cytoplasm : What do your results show about the concentration of the cytoplasm in the potato cell at the start of the experiment?
What ethical issues arise when conducting research : Do you detect any specific problems that might arise because of the "skip" procedure used in this study?
Different ways that firms try to develop innovations : Discuss some different ways that firms try to develop innovations. For each method that you identify,provide a specific example of a product that was developed following this approach.
Video regarding the built environment : After watching the video regarding the built environment and its links to health: What are some ways that you think that we can engineer our local communities to be safer and injury-free?
Are you legally obliged to keep your promise : Are you legally obliged to keep your promise? What are the legal remedies? If you did not agree to their terms, and they walked out, what would you have been able to do if the orders weren't fulfilled and the business lost $10,000.00?
Mechanisms of inspiration and expiration : Research a disease such as asthma or emphysema and discuss how the mechanisms of inspiration and expiration are affected.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Law Enforcement and Cyber Crime

Proposal: Make sure that you really focus on one of the main issues in cybercrimes which is jurisdiction. Unlike other crimes, it is not typically committed locally. It may be committed from another country or from another state. This creates majo..

  How would you specify this protection scheme in unix

Option 1: Write a 1- to 2-page paper that discusses the following scenario: Consider a system that supports 5,000 users. Suppose you want to allow 4,990 of those users to be able to access one file. How would you specify this protection scheme in UNI..

  What is the difference between inputstream and filereader

WHat is the difference between InputStream and FileReader?

  Prove that rsa decryption algorithm recovers original msg

Prove that the RSA decryption algorithm recovers the original message; that is, med ≡ m mod pq. Hint: You may assume that, because p and q are relatively prime, it suffices to prove the congruence mod p and mod q.

  Develop a conversion strategy

Implementing Target was a major undertaking for a number of reasons. If you were an analyst on the project, what kinds of issues would you have to address to make sure the conversion happened successfully

  Describe and explain internet protocol security

Describe and explain Internet protocol security

  Find out how smtp hosts deal with unknown commands

You can either read the RFC or contact an SMTP server as in Exercise 14 and test its responses to nonexistent commands.

  What will be the date in the opening of the letter

If /home/zach/draft and /home/max/letter are links to the same file and the following sequence of events occurs, what will be the date in the opening of the letter?

  Internal it services hosted on premise

Many organizations are using cloud services in place of internal IT services hosted on premise. Cloud services reduce the need for capital expenditure and can be set up in minutes without the need for long hardware procurement cycles. However usin..

  Advantages and disadvantages of combining the session

advantages and disadvantages of combining the session

  Number of customers until the appropriate sentinel value

Execute the program continuously for any number of customers until the appropriate sentinel value is entered. Save the program as HowellBank.java.

  Explaining network attacker steal secure google cookies

Explain how a network attacker (an active attacker that can intercept or forge network packets, etc.) could steal secure google.com cookies.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd