In an Internet-based study, a researcher requires the participants to supply their e-mail
address. What ethical guideline is potentially violated when using this type of strategy?
What will be an ideal response?
confidentiality
You might also like to view...
The number of cells in a cross-tabulation table equals _____
a. the number of columns b. the number of rows c. the product of the rows and columns d. the number of nominal variables
Matthew's mother abused him when he cried. She had been abused herself as a child. It is likely that Matthew will have which type of attachment?
A) insecure-disorganized B) insecure-avoidant C) insecure-resistant D) secure
A video showing twelve blackbirds flying and landing on the top of a large tree is an example of what type of imagery?
A. spatial imagery B. propositional imagery C. motor imagery D. all of the above
An online advertisement describes a book that offers interpretations of dreams. In attempting to tell readers the meaning of the symbols in their dreams, the author intends to describe the __________ content.
A. deep B. latent C. manifest D. subliminal