If yes, what is the evidence that research procedures are sensitive to local research context?

Institutional Review Board (IRB) – Full Review Form

Please complete the following sections in enough detail for the IRB to understand the nature, intent, and procedure of your project. Enter the following information within this document.

1. Title:

2. Project Summary:

Summarize your project in enough detail to give the IRB an overview of the project

3. Research Question:

State your research questions and hypotheses if applicable

4. Foreseeable Benefits:

What are the potential benefits associated with this project?

a. What if any is the immediate benefit of this research to the participant?

b. How does this research benefit the population of persons similar to participants?

c. How does this research contribute to closing a gap in the professional literature?

5. Target Sample Demographics:

a. How many total subjects? What is the age range?

b. Inclusion and exclusion criteria

c. How will participants be assessed for inclusion and exclusion?

d. Who will assess for inclusion and exclusion?

6. Procedures to identify and mitigate risk to human subjects:

a. Recruitment procedures designed to protect privacy. (Privacy is defined as having control over extent, timing and circumstances of sharing oneself with others.)

(1) What is your source of information for recruiting potential participants? Please be attentive to threats to participants’ privacy. An acceptable practice is to distribute invitations to a broad population and ask for persons to self-identify as meeting more narrow criteria.

(2) Who will make initial contact with the participants? What is the setting for initial contact?

(3) What is the content of your invitation to participate?

  • Attach the final text of verbal scripts
  • Attach final text of recruitment materials to be posted or distributed via the internet, poster, flyer, or other vehicle

(4) What is your professional relationship with potential participants?

b. Consenting Process to protect privacy

Privacy is defined as having control over extent, timing and circumstance of sharing oneself with others. Threats to privacy are mitigated by the participant’s informed consent for participation in the research.

(1) What are the specific research related issues that the participant needs to understand in order to give informed consent? How do you plan to educate potential participants about possible risks in the research? How will the participant affirm they understand?

(2) Include a copy of the Informed Consent document, prepared according to the template for face-to-face consent or the template for electronic consent. If children are participants, address the Informed Consent to parents and address an Assent Document to children. If the research involves a focus group, the Informed Consent must state that the Primary Investigator cannot guarantee that participants will honor privacy pledges.

(3) Who will discuss Informed Consent documents with potential participants or their guardians?

Name:

Title:

Does that person speak the same language as the potential participants?

How will you train that person to properly follow the procedures of Informed Consent and to be aware of confidentiality and privacy issues?

Are all members of the research team NIH certified?

(4) What is the procedure for persons who administer Informed Consent to document that the potential participant understands the terms of the consent. See last paragraph of the Informed Consent template.

(5) Where will the Informed Consent documents be stored and how will you protect the security of the documents?

(6) Do you plan to use electronic surveys? Yes/No:

If yes, do you agree to decline the privilege of access to personally identifiable data?

c. Steps to protect confidentiality of data

Confidentiality pertains to treatment of information that an individual discloses in a relationship of trust with the expectation that it will not be divulged to others without permission. Confidentiality is often protected by anonymous responses or by de-identifying data by replacing names with codes.

What are your procedures to protect confidentiality of participants?

d. Data retention and storage

How will you protect stored data and who will have access to the data? Data is typically stored in a locked cabinet with limited access.

e. Risks for physical discomfort and emotional distress associated with research procedures

What components of the research procedures might cause physical discomfort or emotional distress for participants?

What is the anticipated evidence of physical discomfort or emotional distress?

f. How will the researcher respond to evidence of physical discomfort or emotional distress?

What resources are available to the participant?

g. Host for data collection

(1) If potential participants will be recruited from a school, hospital, religious group, professional association, or any other organization, an official of the host organization for data collection must provide written approval of data collection procedures on their site.

  • Have you included the approval with your application? Yes/No:

(2) Do potential participants reside outside the US? Yes/No:

  • If yes, what is the evidence that research procedures are sensitive to local research context? (Possible sources of evidence are approval from an Institutional Review Board in the host country, or written approval from a governmental health or education agency in the host country.)
  • Have you attached this approval to your application? Yes/No:

7. Research Methods

For quantitative studies:

a. Treatment and control conditions, including evidence of safety for participants

b. Randomization procedures

c. Data collection instruments

(1) Attach all data collection instruments that will be used

(2) State here the evidence of instrument suitability for participants, psychometric properties, and required copyright permission

d. Data analysis procedures, including power analysis

For qualitative studies:

e. Theory/conceptual framework guiding data collection, including references to established researchers who have conducted studies with similar procedures

f. Data analysis procedures, including coding and software

8. Research Plan

List approximate dates for major activities in your research plan.

"Get 15% discount on your first 3 orders with us"
Use the following coupon
FIRST15

Order Now