SlideShare a Scribd company logo
1 of 1
Involving human subjects requires that researchers be cognizant
of and adhere to the important tenets necessary to protect
subjects from abuse, harm, injury, and/or other undesirable
outcomes resulting from the research process. APA formatted
assignment- answering the following questions with a minimum
of 3 “short” sentences for each question:

More Related Content

More from mariuse18nolet

IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
mariuse18nolet
 
IP Subnet Design Project- ONLY QUALITY ASSIGNMENTS AND 0 PLAG.docx
IP Subnet Design Project- ONLY QUALITY ASSIGNMENTS AND 0 PLAG.docxIP Subnet Design Project- ONLY QUALITY ASSIGNMENTS AND 0 PLAG.docx
IP Subnet Design Project- ONLY QUALITY ASSIGNMENTS AND 0 PLAG.docx
mariuse18nolet
 
IranAyatollahTheocracyTwelver ShiismVilayat-e Faghih (jur.docx
IranAyatollahTheocracyTwelver ShiismVilayat-e Faghih (jur.docxIranAyatollahTheocracyTwelver ShiismVilayat-e Faghih (jur.docx
IranAyatollahTheocracyTwelver ShiismVilayat-e Faghih (jur.docx
mariuse18nolet
 
ipopulation monitoring in radiation emergencies a gui.docx
ipopulation monitoring in radiation emergencies a gui.docxipopulation monitoring in radiation emergencies a gui.docx
ipopulation monitoring in radiation emergencies a gui.docx
mariuse18nolet
 
In Innovation as Usual How to Help Your People Bring Great Ideas .docx
In Innovation as Usual How to Help Your People Bring Great Ideas .docxIn Innovation as Usual How to Help Your People Bring Great Ideas .docx
In Innovation as Usual How to Help Your People Bring Great Ideas .docx
mariuse18nolet
 
Investor’s Business Daily – Investors.comBloomberg Business – Blo.docx
Investor’s Business Daily –  Investors.comBloomberg Business – Blo.docxInvestor’s Business Daily –  Investors.comBloomberg Business – Blo.docx
Investor’s Business Daily – Investors.comBloomberg Business – Blo.docx
mariuse18nolet
 
Invitation to Public Speaking, Fifth EditionChapter 8 Introdu.docx
Invitation to Public Speaking, Fifth EditionChapter 8 Introdu.docxInvitation to Public Speaking, Fifth EditionChapter 8 Introdu.docx
Invitation to Public Speaking, Fifth EditionChapter 8 Introdu.docx
mariuse18nolet
 
Invitation to the Life SpanRead chapters 13 and 14.Objectives.docx
Invitation to the Life SpanRead chapters 13 and 14.Objectives.docxInvitation to the Life SpanRead chapters 13 and 14.Objectives.docx
Invitation to the Life SpanRead chapters 13 and 14.Objectives.docx
mariuse18nolet
 
IOBOARD Week 2 Lab BPage 2 of 4Name _________________ Gr.docx
IOBOARD Week 2 Lab BPage 2 of 4Name _________________ Gr.docxIOBOARD Week 2 Lab BPage 2 of 4Name _________________ Gr.docx
IOBOARD Week 2 Lab BPage 2 of 4Name _________________ Gr.docx
mariuse18nolet
 
INVITATION TO Computer Science 1 1 Chapter 17 Making .docx
INVITATION TO  Computer Science 1 1 Chapter 17 Making .docxINVITATION TO  Computer Science 1 1 Chapter 17 Making .docx
INVITATION TO Computer Science 1 1 Chapter 17 Making .docx
mariuse18nolet
 
Investment Analysis & Portfolio Management AD 717 OLHomework E.docx
Investment Analysis & Portfolio Management AD 717 OLHomework E.docxInvestment Analysis & Portfolio Management AD 717 OLHomework E.docx
Investment Analysis & Portfolio Management AD 717 OLHomework E.docx
mariuse18nolet
 
Investment BAFI 1042 Kevin Dorr 3195598 GOODMAN .docx
Investment BAFI 1042  Kevin Dorr 3195598  GOODMAN .docxInvestment BAFI 1042  Kevin Dorr 3195598  GOODMAN .docx
Investment BAFI 1042 Kevin Dorr 3195598 GOODMAN .docx
mariuse18nolet
 
INVESTING IN STOCKS AND BONDSWhy Consider BondsBond.docx
INVESTING IN STOCKS AND BONDSWhy Consider BondsBond.docxINVESTING IN STOCKS AND BONDSWhy Consider BondsBond.docx
INVESTING IN STOCKS AND BONDSWhy Consider BondsBond.docx
mariuse18nolet
 
Investigation 6Fraud Investigation Paper.docx
Investigation     6Fraud Investigation Paper.docxInvestigation     6Fraud Investigation Paper.docx
Investigation 6Fraud Investigation Paper.docx
mariuse18nolet
 
Investment BankingTwo basic methods exist for transferring funds.docx
Investment BankingTwo basic methods exist for transferring funds.docxInvestment BankingTwo basic methods exist for transferring funds.docx
Investment BankingTwo basic methods exist for transferring funds.docx
mariuse18nolet
 
Invited Paper – EDSIGCON 2017 Keynote Reflections on the Cur.docx
Invited Paper – EDSIGCON 2017 Keynote Reflections on the Cur.docxInvited Paper – EDSIGCON 2017 Keynote Reflections on the Cur.docx
Invited Paper – EDSIGCON 2017 Keynote Reflections on the Cur.docx
mariuse18nolet
 
Investigating Our Cultural Norms 1Investiga.docx
Investigating Our Cultural Norms                1Investiga.docxInvestigating Our Cultural Norms                1Investiga.docx
Investigating Our Cultural Norms 1Investiga.docx
mariuse18nolet
 
Investigation of Terrorism - CRJ 460 2Module 4 - Homework Assign.docx
Investigation of Terrorism - CRJ 460 2Module 4 - Homework Assign.docxInvestigation of Terrorism - CRJ 460 2Module 4 - Homework Assign.docx
Investigation of Terrorism - CRJ 460 2Module 4 - Homework Assign.docx
mariuse18nolet
 
iProfile 3.0 .docx
iProfile 3.0                                                  .docxiProfile 3.0                                                  .docx
iProfile 3.0 .docx
mariuse18nolet
 
IPO PresentationYou work for a medium sized privately held elec.docx
IPO PresentationYou work for a medium sized privately held elec.docxIPO PresentationYou work for a medium sized privately held elec.docx
IPO PresentationYou work for a medium sized privately held elec.docx
mariuse18nolet
 

More from mariuse18nolet (20)

IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
IP Subnet Design Project- ONLY QUALITY ASSIGNMENTS AND 0 PLAG.docx
IP Subnet Design Project- ONLY QUALITY ASSIGNMENTS AND 0 PLAG.docxIP Subnet Design Project- ONLY QUALITY ASSIGNMENTS AND 0 PLAG.docx
IP Subnet Design Project- ONLY QUALITY ASSIGNMENTS AND 0 PLAG.docx
 
IranAyatollahTheocracyTwelver ShiismVilayat-e Faghih (jur.docx
IranAyatollahTheocracyTwelver ShiismVilayat-e Faghih (jur.docxIranAyatollahTheocracyTwelver ShiismVilayat-e Faghih (jur.docx
IranAyatollahTheocracyTwelver ShiismVilayat-e Faghih (jur.docx
 
ipopulation monitoring in radiation emergencies a gui.docx
ipopulation monitoring in radiation emergencies a gui.docxipopulation monitoring in radiation emergencies a gui.docx
ipopulation monitoring in radiation emergencies a gui.docx
 
In Innovation as Usual How to Help Your People Bring Great Ideas .docx
In Innovation as Usual How to Help Your People Bring Great Ideas .docxIn Innovation as Usual How to Help Your People Bring Great Ideas .docx
In Innovation as Usual How to Help Your People Bring Great Ideas .docx
 
Investor’s Business Daily – Investors.comBloomberg Business – Blo.docx
Investor’s Business Daily –  Investors.comBloomberg Business – Blo.docxInvestor’s Business Daily –  Investors.comBloomberg Business – Blo.docx
Investor’s Business Daily – Investors.comBloomberg Business – Blo.docx
 
Invitation to Public Speaking, Fifth EditionChapter 8 Introdu.docx
Invitation to Public Speaking, Fifth EditionChapter 8 Introdu.docxInvitation to Public Speaking, Fifth EditionChapter 8 Introdu.docx
Invitation to Public Speaking, Fifth EditionChapter 8 Introdu.docx
 
Invitation to the Life SpanRead chapters 13 and 14.Objectives.docx
Invitation to the Life SpanRead chapters 13 and 14.Objectives.docxInvitation to the Life SpanRead chapters 13 and 14.Objectives.docx
Invitation to the Life SpanRead chapters 13 and 14.Objectives.docx
 
IOBOARD Week 2 Lab BPage 2 of 4Name _________________ Gr.docx
IOBOARD Week 2 Lab BPage 2 of 4Name _________________ Gr.docxIOBOARD Week 2 Lab BPage 2 of 4Name _________________ Gr.docx
IOBOARD Week 2 Lab BPage 2 of 4Name _________________ Gr.docx
 
INVITATION TO Computer Science 1 1 Chapter 17 Making .docx
INVITATION TO  Computer Science 1 1 Chapter 17 Making .docxINVITATION TO  Computer Science 1 1 Chapter 17 Making .docx
INVITATION TO Computer Science 1 1 Chapter 17 Making .docx
 
Investment Analysis & Portfolio Management AD 717 OLHomework E.docx
Investment Analysis & Portfolio Management AD 717 OLHomework E.docxInvestment Analysis & Portfolio Management AD 717 OLHomework E.docx
Investment Analysis & Portfolio Management AD 717 OLHomework E.docx
 
Investment BAFI 1042 Kevin Dorr 3195598 GOODMAN .docx
Investment BAFI 1042  Kevin Dorr 3195598  GOODMAN .docxInvestment BAFI 1042  Kevin Dorr 3195598  GOODMAN .docx
Investment BAFI 1042 Kevin Dorr 3195598 GOODMAN .docx
 
INVESTING IN STOCKS AND BONDSWhy Consider BondsBond.docx
INVESTING IN STOCKS AND BONDSWhy Consider BondsBond.docxINVESTING IN STOCKS AND BONDSWhy Consider BondsBond.docx
INVESTING IN STOCKS AND BONDSWhy Consider BondsBond.docx
 
Investigation 6Fraud Investigation Paper.docx
Investigation     6Fraud Investigation Paper.docxInvestigation     6Fraud Investigation Paper.docx
Investigation 6Fraud Investigation Paper.docx
 
Investment BankingTwo basic methods exist for transferring funds.docx
Investment BankingTwo basic methods exist for transferring funds.docxInvestment BankingTwo basic methods exist for transferring funds.docx
Investment BankingTwo basic methods exist for transferring funds.docx
 
Invited Paper – EDSIGCON 2017 Keynote Reflections on the Cur.docx
Invited Paper – EDSIGCON 2017 Keynote Reflections on the Cur.docxInvited Paper – EDSIGCON 2017 Keynote Reflections on the Cur.docx
Invited Paper – EDSIGCON 2017 Keynote Reflections on the Cur.docx
 
Investigating Our Cultural Norms 1Investiga.docx
Investigating Our Cultural Norms                1Investiga.docxInvestigating Our Cultural Norms                1Investiga.docx
Investigating Our Cultural Norms 1Investiga.docx
 
Investigation of Terrorism - CRJ 460 2Module 4 - Homework Assign.docx
Investigation of Terrorism - CRJ 460 2Module 4 - Homework Assign.docxInvestigation of Terrorism - CRJ 460 2Module 4 - Homework Assign.docx
Investigation of Terrorism - CRJ 460 2Module 4 - Homework Assign.docx
 
iProfile 3.0 .docx
iProfile 3.0                                                  .docxiProfile 3.0                                                  .docx
iProfile 3.0 .docx
 
IPO PresentationYou work for a medium sized privately held elec.docx
IPO PresentationYou work for a medium sized privately held elec.docxIPO PresentationYou work for a medium sized privately held elec.docx
IPO PresentationYou work for a medium sized privately held elec.docx
 

Involving human subjects requires that researchers be cognizant of a

  • 1. Involving human subjects requires that researchers be cognizant of and adhere to the important tenets necessary to protect subjects from abuse, harm, injury, and/or other undesirable outcomes resulting from the research process. APA formatted assignment- answering the following questions with a minimum of 3 “short” sentences for each question: