ࡱ> 685e bjbjJJ .&(_b(_b22222FFFFbFX~~~~~YYY      $ ZD2YYD22~~Yv2~2~>~t!|"V o0^,!@^!!2Y0"YYYDD"YYY!YYYYYYYYYB : Skidmore College Institutional Review Board Research Proposal Template [Use this template for your proposal submission. Attach this completed template to your electronic submission form. Bracketed information provides instructions and should be deleted from your final proposal.] 1. Title of Proposal: 2. Principal Investigator (PI): 3. PI Department: 4. PI Contact Information: 5. Faculty Sponsor and Contact Information (if PI is a student): 6. Other Investigators (name, e-mail address, and if student, class year): 7. Date of this Submission: 8. Proposed Duration of the Project (indicate starting and ending dates): 9. Background Information and Research Questions/Hypotheses: [Provide a brief rationale for your study and your main research questions/hypotheses.] 10. Human Participants: A. Who are the participants? B. How many participants do you plan to have in your study? C. How will the participants be contacted or recruited? D. Will the participants be compensated for participating? If so, describe: 11. Procedures: [What will you ask the participants to do? Where will your research activities be carried out (be specific)? Be sure to include all supporting documentation, i.e., data collection instruments. Be very specific about your procedures and present them in easily understandable terms.] [Websurveys: If your procedure includes a websurvey, indicate the software program you will use. Websurveys should allow any question to be skipped (e.g., offer an I choose not to answer response or allow questions to remain unanswered while still continuing the websurvey). At the end of the survey, provide an option for participants to withdraw from the study without submitting their responses (e.g., submit answers now versus cancel, do not submit answers; see Informed Consent Guidelines. Websurvey software must use SSL encryption, and must be set up to collect data anonymously, i.e., without saving user names or IP addresses. If data are not collected anonymously, explain to the IRB the purpose of collecting identifying information and how confidentiality will be maintained.] 12. Consent: [How will the participant give consent to be in your research? Be sure to attach any consent forms/scripts you will use.] [Websurveys: Note that low-risk studies using websurveys to collect data may be eligible to use implied consent, such that completing and returning the survey indicates consent to participate. In those cases, it is acceptable for participants to be instructed to click on a link if they give their consent to participate in the study. When implied consent is used, a brief statement of how confidentiality and privacy will be handled must appear in a concise consent statement at the beginning of the survey.] 13. Risks and Debriefing: [If applicable, describe your plan to debrief participants. Is there deception involved in your study? What are the physical, psychological, or social risks of participating in the study? Are there any technical aspects of equipment that pose a potential hazard to participants? Note: If conducting in-person, on-campus human subjects research, you must include in the the COVID-19 risks your participants may encounter by participating in your research study and how those risks will be mitigated.] Privacy and Storage of Data: [Explicitly describe how you plan to store data and to protect participants privacy.] [Websurveys: Describe how you will protect participants identities and responses (e.g., using SSL encryption, not collecting IP addresses, instructing the participant to clear the cache and browser history to maintain their privacy after completing the survey, storing the data in a password protected database). See Informed Consent Guidelines for more information. The IRB recommends that researchers use the following statement: The researcher(s) has taken all reasonable measures to protect your identity and responses. For example, the data is SSL encrypted, it is stored on a password protected database, and IP addresses are not collected. These measures provide the very high level of security that is used by financial institutions, and it is very unlikely that your data could be accessed by anyone. However, e-mail and the Internet are not 100% secure. Therefore, we also suggest that you clear the computers cache and browser history to protect your privacy after completing the survey.] 15. References cited in this proposal: G 1 4 V W  8 9 \  1 : R Y   * H J K W p q \]`:;_`abuDz hhBl hh!V haUh6 haUh" hh6 hh' hhf9_ hh"hhH75\ hhH7hhH75CJ\A,G  3 4 V W k l   8 9   5 6 U ` 0^`0$a$   J ab&'zgh^gdvG ^`gd!V & F0`0gdI^gd*m 0^`0gd6 ^`gd" 0^`0`+6;S@ %&' x|JȾ}v}v hh J hh6 hh6 hh' hh!V hh*m h*mh*mh*mh*m5hH7h*m hhH7hhH75\ hhqd hH7>*\hh!V>*\ hh^hh0Z'\hh!V\hh6\-$abmqdefhhvGhvG5 hvG5hvG hh6 hh J hh; hh!Vh)h 0^`0gdvG,1h/ =!"#$% s2&6FVfv2(&6FVfv&6FVfv&6FVfv&6FVfv&6FVfv&6FVfv8XV~ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@_HmH nH sH tH @`@ NormalCJ_HaJmH sH tH DA D Default Paragraph FontViV  Table Normal :V 44 la (k (No List JCJ Body Text Indent ^5\HH 6 Balloon TextCJOJQJ^JaJPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭Vc:E3v@P~Ds |w<  &  h8@0(  B S  ?2!,(3!,(4!,( 9*urn:schemas-microsoft-com:office:smarttagsplace=*urn:schemas-microsoft-com:office:smarttags PlaceName=*urn:schemas-microsoft-com:office:smarttags PlaceType KUt}S\;D * {  %  22W9bh %  f %  7b*6nC^`5o(. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.7b        "m;0Z')~#*6H7vG J!VnX\f9_qdBl*mI'CaU6^q@  @Unknownq.[x Times New RomanTimes New Roman PSMT5Symbol3. .Cx Arial5..[`)TahomaA$BCambria Math"qh ۈ ۈ#X#X4oo3QHP ?m2!xxP+ E-Form:newuser Mary Hoehn Oh+'0t  0 < HT\dlE-Form:newuser Normal.dotm Mary Hoehn3Microsoft Office Word@@||@|| ՜.+,0 hp  Skidmore CollegeX#o E-Form: Title  !"#$&'()*+,./012347Root Entry F0X8|91Table!WordDocument.&SummaryInformation(%DocumentSummaryInformation8-CompObjr  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q