Posts

NR705-WEEK 3 Discussion-The DNP Practice Change Project

NR705-WEEK 3 Discussion-The DNP Practice Change Project

The Data Collection and Analysis Plan

Practice Question

The following practice question will serve as the basis of the DNP project: For adults with a history of Schizophrenia (P) in the inpatient setting, does the implementation of technology with motivational interviewing (I), compared with current practice (C), impact medication nonadherence (O) in 8-10 weeks (T)?

NR705-WEEK 3 Discussion-The DNP Practice Change Project

Plan to Protect Participant’s Confidentiality and Identity

Confidentiality involves the protection of human participants’ personal identifiers or personally identifiable data. It is an agreement between the researchers and the participants provided via informed consent as a guarantee that the participant’s identity and private or personal details and responses are not disclosed to unauthorized individuals or people outside the research team without consent (Purdue University, 2019). It is difficult for researchers to guarantee confidentiality when collecting identifiable details because there are limitations to confidentiality, including mandatory reporting laws and inspection of research data and records by IRB or the sponsor (Turcotte-Tremblay et al., 2018). Nonetheless, participants should know how their information will be stored during and after research (Purdue University, 2019). To protect participants’ data in this research and protect their identity, the project team will encrypt computer-based files, store documents like signed consent forms in locked file cabinets, and avoid using personal identifiers in study documents. Additionally, codes will be substituted for participant identifiers.

The information collected during the project development and implementation will be used over time and stored for future reference. The project team will establish a data management plan to protect and maintain the data over time. Physical documents will be stored in an environment with controlled access and under industry regulations such as HIPPA, SOC-2, and PIPEDA (University of Nevada, 2021). Staff authorized to access and utilize the data will receive routine security training to ensure best practices regarding participants’ data protection, including identifying new security threats, enforcing data protection regulations, and identifying better ways to secure the data (Turcotte-Tremblay et al., 2018). The data will be backed up to protect it from loss, system failure, or potential destruction. The data will be stored securely after this project, and it can be retrieved in future for similar projects.

References

Purdue University. (2019). Important considerations for protecting human research participantshttps://www.purdue.edu/research/dimensions/important-considerations-for-protecting-human-research-participants/

Turcotte-Tremblay, A. M., & Mc Sween-Cadieux, E. (2018). A reflection on the challenge of protecting confidentiality of participants while disseminating research results locally. BMC medical ethics19(Suppl 1), 45. https://doi.org/10.1186/s12910-018-0279-0

University of Nevada. (2021, July 13). 410. Maintaining Data Confidentialityhttps://www.unr.edu/research-integrity/human-research/human-research-protection-policy-manual/410-maintaining-data-confidentiality

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!