16.11.2014 Views

Qualitative Research in Practice : Stories From the Field - Blogs Unpad

Qualitative Research in Practice : Stories From the Field - Blogs Unpad

Qualitative Research in Practice : Stories From the Field - Blogs Unpad

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Qualitative</strong> research <strong>in</strong> practice<br />

research data to be analysed by o<strong>the</strong>rs is regarded as an important<br />

safeguard aga<strong>in</strong>st fraudulent research, and secondary data analysis<br />

is very useful as it can allow subsequent <strong>in</strong>vestigation of valuable<br />

data <strong>in</strong> relation to different research questions. For <strong>the</strong>se reasons<br />

researchers are usually required to keep <strong>the</strong>ir data for a number of<br />

years to enable o<strong>the</strong>rs to have access to it. In contract research <strong>the</strong><br />

data typically belongs to those fund<strong>in</strong>g <strong>the</strong> research and thus future<br />

access is not controlled by those actually do<strong>in</strong>g <strong>the</strong> research. This<br />

can create problems when applied to qualitative research as ‘later<br />

use by different researchers may be <strong>in</strong>appropriate for projects which<br />

collected <strong>in</strong>-depth <strong>in</strong>terviews on sensitive topics’ (Commonwealth<br />

Department of Human Services and Health, 1995, p. 14).<br />

Even when <strong>the</strong> researcher ‘owns’ <strong>the</strong> data, once <strong>the</strong> research is<br />

part of <strong>the</strong> public doma<strong>in</strong> <strong>the</strong> researcher may have little control over<br />

how it is used and aspects may be selectively quoted. ‘<strong>Research</strong>ers<br />

noted that it was frequently difficult to control <strong>the</strong> use of reports<br />

once <strong>the</strong>y became a part of <strong>the</strong> public doma<strong>in</strong>. They expressed<br />

concerns about simplistic or sensationalist media coverage’<br />

(Commonwealth Department of Human Services and Health, 1995,<br />

p. 13).<br />

<strong>Research</strong>ers must <strong>the</strong>refore be aware that what <strong>the</strong>y write may<br />

be used <strong>in</strong> ways o<strong>the</strong>r than <strong>the</strong>y <strong>in</strong>tended. For a research participant<br />

to see <strong>the</strong>ir words used or, as <strong>the</strong>y might perceive it, misused, <strong>in</strong> <strong>the</strong><br />

public doma<strong>in</strong> can be a deeply violat<strong>in</strong>g experience even if <strong>the</strong>ir<br />

identity is not revealed.<br />

To disguise <strong>the</strong> verbatim quotes of <strong>in</strong>terviewees by paraphras<strong>in</strong>g<br />

<strong>the</strong>m would defeat <strong>the</strong> purpose of much qualitative research. The<br />

challenge <strong>the</strong>n is to dissem<strong>in</strong>ate <strong>the</strong> voices of those previously<br />

unheard <strong>in</strong> <strong>the</strong> public doma<strong>in</strong> <strong>in</strong> ways <strong>in</strong> which privacy is protected.<br />

The researchers do<strong>in</strong>g <strong>the</strong> older adopted children study described<br />

above did this <strong>in</strong> a novel way (Thomas et al., 1999). They taperecorded<br />

o<strong>the</strong>r children read<strong>in</strong>g <strong>the</strong> transcripts of <strong>the</strong> adopted<br />

children’s <strong>in</strong>terviews and played <strong>the</strong> <strong>in</strong>terviews to prospective<br />

adoptive parents and social workers dur<strong>in</strong>g <strong>the</strong>ir tra<strong>in</strong><strong>in</strong>g sessions<br />

to enable <strong>the</strong>m to appreciate <strong>the</strong> subjective experiences of adopted<br />

children <strong>in</strong> <strong>the</strong>ir own words. This protected <strong>the</strong> privacy of <strong>the</strong><br />

adopted children while evocatively convey<strong>in</strong>g <strong>the</strong>ir experiences<br />

much more powerfully than <strong>the</strong> written word allowed. This<br />

example highlights <strong>the</strong> sensitive and <strong>in</strong>dividualised ways <strong>in</strong> which<br />

researchers can apply ethical pr<strong>in</strong>ciples.<br />

30

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!