Top of Page
Skip main navigation

Institutional Review Board (IRB)

The Institutional Review Board (IRB) provides guidelines for research with human subjects to ensure that they’re protected within the design and conduct of research. As part of mandates set by the federal government, all institutions conducting research using human subjects must have an individual IRB.

This IRB must review and approve all research processes where human subjects are used. While federally financed research must be reviewed by an IRB, NSU’s IRB reviews all research that involves human subjects.

NSU’s IRB is responsible for determining and assuring that:

  • The welfare and rights of human subjects are protected.
  • Human subjects give informed consent.
  • Human subjects are not placed at unreasonable physical, mental, or emotional risk as a result of the research.
  • The necessity and importance of the research outweighs the risks to the subjects.
  • The researchers is/are qualified to conduct research involving human subjects.

Information for Investigators from the University Institutional Review Board

While the University-level IRB Board has review authority of all NSU research, most research in the College of Computing and Engineering is ultimately determined by the College of Computing and Engineering IRB representative to be exempt from further review by the University, but are nonetheless logged and reported to the NSU Office of Grants and Contracts on a monthly basis. This occurs in cases where the research is regarded as not having potential risk to subjects due to one of the following circumstances:

  1. Research in which the risks of harm reasonably anticipated are not greater than those ordinarily encountered in daily life or during the performance of routine procedures in education and/or in the practice of psychology and medicine
  2. Research on the effectiveness of educational, classroom, and/or instructional strategies, provided that these strategies are familiar, and non-intrusive in their implementation
  3. Research using educational tests (cognitive, diagnostic, aptitude, achievement) if subjects' identities are thoroughly protected
  4. Research using survey procedures or interview procedures where subjects' identities are thoroughly protected and their answers do not subject them to criminal and civil liability
  5. Research involving the collection or study of existing data, documents, records, specimens, or other products, if these sources are publicly available or the information is recorded by the investigator in such a manner that the subjects cannot be identified directly or indirectly.

While the IRB process may appear to be an unnecessary administrative burden, the process is critical to the future of research at NSU and it can be completed quickly by following a brief number of specific steps.

The IRB process is relatively simple, but there are a few required steps that must be completed precisely by the student to facilitate the efficient processing of their IRB approval request. It is recommended that students begin the IRB process immediately after the approval of their dissertation idea paper. At this point the proposed research has reached a point that it will probably encounter minimal changes and it is still early enough in the dissertation process to avoid unnecessary delays in the initiation of their research.

The following steps must be followed by the College of Engineering and Computing doctoral students seeking IRB approval for their research:

  1. The student must complete the "College of Engineering and Computing" set of training modules in the CITI Training Program.
  2. The student needs to create an account in the IRB’s electronic submission system, IRBManager at Helpful information about IRBManager is available from the NSU IRB web site. The student should submit the IRB documentation to the IRBManager.
  3. The student must complete an IRB Submission Form, and an Informed Consent Form (the request for waiver of consent will be reviewed on a case-by-case basis). The forms can be copied from the NSU IRB web site using the "save as" utility in most commercial web browsers. The saved HTML pages can then be opened with Word and modified as necessary. Additional forms and documentation, such as copies of surveys and questionnaires, may also be required. 

  4. The status of the IRB review, including the final IRB approval, will be emailed to the student and their advisor by Dr. Wang.

Confidentiality of Information - The confidentiality of the human subjects is typically the most important factor in determining whether a College of Engineering and Computing research proposal is exempt from further review. As stated in the NSU IRB Policy:

"…an investigator must not maintain any form of linkage in order to go back and review the record at a later time. If linkage between the data and the subject must be maintained, the protocol should be submitted for review."

Due to the nature of almost all College of Engineering and Computing research the possibility of physical harm to human subjects is typically minimal or non-existent. However, human subjects of the College of Engineering and Computing research could suffer financial or emotional harm in some circumstances if their individual responses to sensitive questions became public knowledge. As an example, if a subject describes various faults in the management practices of their organization as part of a College of Engineering and Computing research survey and if their identifying information is later associated with their responses then they may face retribution by their managers. To avoid any possibility of this type of problem the confidentiality of the subject's responses must be maintained and the measures taken by the College of Engineering and Computing researcher to protect this confidentiality must be fully delineated in the IRB Research Protocol. The following are examples of text from IRB Research Protocols that have been approved in the past:

  1. "Strict confidentiality will be maintained at all times. New employees and their project managers will be given numbers for tracking purposes. Contact records used for linking the names of the new employees and their project managers to their tracking numbers will be deleted at the conclusion of the study. During the study, the contact records will be maintained in one computer location protected by password and one disk backup stored in a government-classified safe. All reporting will be in the aggregate; names or colleges will not be used to identify individuals."
  2. "The participant name is entered into the application database only if the participant consents to participate. The userID is then used at login to enter a new project or to update a project. The application will verify that each userID is unique. Confidentiality will be maintained by the use of the distinct userID in the application. After the data collection time period has expired, the researcher will assign and refer to the participants by numerical coding and all personal identifying data will be deleted. The list linking participants with userID and numerical coding will be maintained by the researcher in locked files. The researcher anticipates reporting to be in aggregate format. All demographic data collected will be accessible only to the researcher. The user table has permissions of 'write-only' through the application."
  3. "Information obtained in this study will be strictly confidential unless disclosure is required by law. Participants will be assigned a study number, and this number, rather than the participants' names, will be recorded at the time of interviews. Only the study investigator will have a record of which person has been assigned what number and this information will be secured in a locked filing cabinet. Participant names will not be used in the reporting of information in publications or conference presentations. The results of the study will be reported in terms of the various treatment groups, not in terms of individuals. Thus anonymity and confidentiality will be protected."

These descriptions are provided as a guide for students in addressing the confidentiality of their research process. The specific description should reflect the unique characteristics of the particular research effort. However, the measures that will be taken in protecting the identity of human subjects must be clearly described in the Research Protocol.

The participation by human subjects in any College of Engineering and Computing research project must be consensual. As stated in the NSU policy:

"…no investigator may involve a human being as a subject in research, as defined in this policy and procedure manual, unless the investigator has obtained the subject's informed consent. The process of informed consent is constituted by two essential elements: (1) the subject has the information he or she requires to make an effective decision, and (2) the subject's participation is not coerced, i.e. his or her consent is voluntary."

While this requirement usually results in the use of an Informed Consent Form in the proposed research, the NSU requirement for human subjects to provide their informed consent does not necessarily require the subject to execute a document as proof of their consent. As noted in the NSU policy the requirement the IRB may approve a consent procedure which does not include, or which alters, some or all or the elements of informed consent, or waive the requirement to obtain informed consent provided the IRB finds and documents:

  1. The research involves no more than minimal risks
  2. The rights and welfare of subjects will not be adversely affected
  3. The research could not practicably be carried out without the waiver or alteration
  4. Whenever appropriate, the subjects will be provided with additional pertinent information after participation
  5. The research is to be conducted for the purpose of demonstrating or evaluating federal, state, or local service programs that are not research programs, etc.

While most of the research proposed by the College of Engineering and Computing students may fall under one or more of these situations, the use of an Informed Consent Form must be used unless the use of the form may adversely effect the research (e.g., having a subject sign the form may reduce the spontaneity of their responses to the researchers questions, etc.). If an Informed Consent Form will not be used in the research then the reason for this omission should be described briefly in the Research Protocol.

All the College of Engineering and Computing research proposals that are submitted for IRB approval are initially reviewed by Dr. Wang. Most of the proposals are approved at the College of Engineering and Computing level and are exempt from additional IRB reviews. In unusual cases an additional review of the research may be conducted by the University-level IRB Board. Due to the possibility that required revisions of IRB documentation may necessitate additional College of Engineering and Computing reviews, and due to the possibility that subsequent University-level reviews may be required, it is recommended that students submit their IRB documentation to Dr. Wang 60 days prior to the anticipated start date for their research.

Ling Wang, Ph.D.
College of Engineering and Computing
Nova Southeastern University
3300 S. University Drive,
Fort Lauderdale, FL, 33328-2004
(954) 262-2020
800 986-2247, ext. 22020

Return to top of page NSU_Virtual_Assistant_Prod

NSU Virtual Assistant