RESEARCH METHOD COHEN ok
RESEARCH METHOD COHEN ok RESEARCH METHOD COHEN ok
SAMPLING AND ACCESS 121 will incur sensitivities, the attraction of discussing sensitive research per se is that it highlights what these delicate issues might be and how they might be felt at their sharpest. We advise readers to consider most educational research as sensitive, to anticipate what those sensitivities might be, and what trade-offs might be necessary. Sampling and access Walford (2001: 33) argues that gaining access and becoming accepted is a slow process. Hammersley and Atkinson (1983: 54) suggest that gaining access not only is a practical matter but also provides insights into the ‘social organisation of the setting’. Lee (1993: 60) suggests that there are potentially serious difficulties in sampling and access in sensitive research, not least because of the problem of estimating the size of the population from which the sample is to be drawn, as members of particular groups, e.g. deviant or clandestine groups, will not want to disclose their associations. Similarly, like-minded groups may not wish to open themselves to public scrutiny. They may have much to lose by revealing their membership and, indeed, their activities may be illicit, critical of others, unpopular, threatening to their own professional security, deviant and less frequent than activities in other groups, making access to them a major obstacle. What if a researcher is researching truancy, or teenage pregnancy, or bullying, or solvent abuse among school students, or alcohol and medication use among teachers, or family relationship problems brought about by the stresses of teaching Lee (1993: 61) suggests several strategies to be used, either separately or in combination, for sampling ‘special’ populations (e.g. rare or deviant populations): List sampling: lookingthroughpublicdomain lists of, for example, the recently divorced (though such lists may be more helpful to social researchers than, specifically, educational researchers). Multipurposing: using an existing survey to reach populations of interest (though problems of confidentiality may prevent this from being employed). Screening: targeting a particular location and canvassing within it (which may require much effort for little return). Outcropping:thisinvolvesgoingtoaparticular location where known members of the target group congregate or can be found (e.g. Humphreys’ (1970) celebrated study of homosexual ‘tearoom trade’); in education this may be a particular staffroom (for teachers), or meeting place for students. Outcropping risks bias, as there is no simple check for representativeness of the sample. Servicing: Lee (1993: 72) suggests that it may be possible to reach research participants by offering them some sort of service in return for their participation. Researchers must be certain that they really are able to provide the services promised. As Walford (2001: 36) writes: ‘people don’t buy products; they buy benefits’, and researchers need to be clear on the benefits offered. Professional informants: Lee(1993:73)suggests these could be, for example, police, doctors, priests, or other professionals. In education these may include social workers and counsellors. This may be unrealistic optimism, as these very people may be bound by terms of legal or ethical confidentiality or voluntary self-censorship (e.g. an AIDS counsellor, after a harrowing day at work, may not wish to continue talking to a stranger about AIDS counselling, or a social worker or counsellor may be constrained by professional confidentiality, or an exhausted teacher may not wish to talk about teaching difficulties). Further, Lee suggests that, even if such people agree to participate, they may not know the full story; Lee (1993: 73) gives the example of drug users whose contacts with the police may be very different from their contacts with doctors or social workers, or, the corollary of this, the police, doctors and social workers may not see the same group of drug users. Advertising:thoughthiscanpotentiallyreacha wide population, it may be difficult to control Chapter 5
122 SENSITIVE EDUCATIONAL RESEARCH the nature of those who respond, in terms of representativeness or suitability. Networking: thisisakintosnowballsampling, wherein one set of contacts puts the researcher in touch with more contacts, who puts the researcher in touch with yet more contacts and so on. This is a widely used technique, though Lee (1993: 66) reports that it is not always easy for contacts to be passed on, as initial informants may be unwilling to divulge members of a close-knit community. On the other hand, Morrison (2006) reports that networking is a popular technique where it is difficult to penetrate a formal organization such as a school, if the gatekeepers (those who can grant or prevent access to others, e.g. the headteacher or senior staff) refuse access. He reports the extensive use of informal networks by researchers, in order to contact friends and professional associates, and, in turn, their friends and professional associates, thereby sidestepping the formal lines of contact through schools. Walford (2001: 36–47) sets out a four-step process of gaining access: 1 Approach (gaining entry, perhaps through a mutual friend or colleague – a link person). In this context Walford (2001) cautions that an initial letter should be used only to gain an initial interview or an appointment, or even to arrange to telephone the headteacher in order to arrange an interview, not to conduct the research or to gain access. 2 Interest (using a telephone call to arrange an initial interview). In this respect Walford (2001: 43) notes that headteachers like to talk, and so it is important to let them talk, even on the telephone when arranging an interview to discuss the research. 3 Desire (overcoming objections and stressing the benefits of the research). As Walford (2001: 44) wisely comments: ‘after all, schools have purposes other than to act as research sites’. He makes the telling point that the research may actually benefit the school, but that the school may not realize this until it is pointed out. For example, a headteacher may wish to confide in a researcher, teachers may benefit from discussions with a researcher, students may benefit from being asked about their learning. 4 Sale (where the participants agree to the research). Whitty and Edwards (1994: 22) argue that in order to overcome problems of access, ingenuity and even the temptation to use subterfuge could be considered: ‘denied co-operation initially by an independent school, we occasionally contacted some parents through their child’s primary school and then told the independent schools we already were getting some information about their pupils’. They also add that it is sometimes necessary for researchers to indicate that they are ‘on the same side’ as those being researched. 1 Indeed they report that ‘we were questioned often about our own views, and there were times when to be viewed suspiciously from one side proved helpful in gaining access to the other’ (Whitty and Edwards 1994: 22). This harks back to Becker’s (1968) advice to researchers to decide whose side they are on. The use of snowball sampling builds in ‘security’ (Lee 1993), as the contacts are those who are known and trusted by the members of the ‘snowball’. That said, this itself can lead to bias, as relationships between participants in the sample may consist of ‘reciprocity and transitivity’ (Lee 1993: 67), i.e. participants may have close relationships with one another and may not wish to break these. Thus homogeneity of the sample’s attributes may result. Such snowball sampling may alter the research, for example changing random, stratified or proportionate sampling into convenience sampling, thereby compromising generalizability or generating the need to gain generalizability by synthesizing many case studies. Nevertheless, it often comes to a choice between accepting non-probability strategies or doing nothing. The issues of access to people in order to conduct sensitive research may require researchers to demonstrate a great deal of ingenuity and
- Page 89 and 90: 70 THE ETHICS OF EDUCATIONAL AND SO
- Page 91 and 92: 72 THE ETHICS OF EDUCATIONAL AND SO
- Page 93 and 94: 74 THE ETHICS OF EDUCATIONAL AND SO
- Page 95 and 96: 76 THE ETHICS OF EDUCATIONAL AND SO
- Page 97 and 98: 3 Planning educational research Int
- Page 99 and 100: 80 PLANNING EDUCATIONAL RESEARCH t
- Page 101 and 102: 82 PLANNING EDUCATIONAL RESEARCH de
- Page 103 and 104: 84 PLANNING EDUCATIONAL RESEARCH Bo
- Page 105 and 106: 86 PLANNING EDUCATIONAL RESEARCH Bo
- Page 107 and 108: 88 PLANNING EDUCATIONAL RESEARCH Bo
- Page 109 and 110: 90 PLANNING EDUCATIONAL RESEARCH Bo
- Page 111 and 112: 92 PLANNING EDUCATIONAL RESEARCH Bo
- Page 113 and 114: 94 PLANNING EDUCATIONAL RESEARCH Bo
- Page 115 and 116: 96 PLANNING EDUCATIONAL RESEARCH Or
- Page 117 and 118: 98 PLANNING EDUCATIONAL RESEARCH Pa
- Page 119 and 120: 4 Sampling Introduction The quality
- Page 121 and 122: 102 SAMPLING sample of 200 might be
- Page 123 and 124: 104 SAMPLING Box 4.1 Sample size, c
- Page 125 and 126: 106 SAMPLING would be insufficient
- Page 127 and 128: 108 SAMPLING The formula assumes th
- Page 129 and 130: 110 SAMPLING school governors, scho
- Page 131 and 132: 112 SAMPLING terms of sex, a random
- Page 133 and 134: 114 SAMPLING the required sample si
- Page 135 and 136: 116 SAMPLING Snowball sampling In s
- Page 137 and 138: 118 SAMPLING the kind of sample (d
- Page 139: 120 SENSITIVE EDUCATIONAL RESEARCH
- Page 143 and 144: 124 SENSITIVE EDUCATIONAL RESEARCH
- Page 145 and 146: 126 SENSITIVE EDUCATIONAL RESEARCH
- Page 147 and 148: 128 SENSITIVE EDUCATIONAL RESEARCH
- Page 149 and 150: 130 SENSITIVE EDUCATIONAL RESEARCH
- Page 151 and 152: 132 SENSITIVE EDUCATIONAL RESEARCH
- Page 153 and 154: 134 VALIDITY AND RELIABILITY It is
- Page 155 and 156: 136 VALIDITY AND RELIABILITY using
- Page 157 and 158: 138 VALIDITY AND RELIABILITY includ
- Page 159 and 160: 140 VALIDITY AND RELIABILITY leadin
- Page 161 and 162: 142 VALIDITY AND RELIABILITY social
- Page 163 and 164: 144 VALIDITY AND RELIABILITY this i
- Page 165 and 166: 146 VALIDITY AND RELIABILITY prese
- Page 167 and 168: 148 VALIDITY AND RELIABILITY by ass
- Page 169 and 170: 150 VALIDITY AND RELIABILITY Validi
- Page 171 and 172: 152 VALIDITY AND RELIABILITY typica
- Page 173 and 174: 154 VALIDITY AND RELIABILITY people
- Page 175 and 176: 156 VALIDITY AND RELIABILITY
- Page 177 and 178: 158 VALIDITY AND RELIABILITY sensit
- Page 179 and 180: 160 VALIDITY AND RELIABILITY certif
- Page 181 and 182: 162 VALIDITY AND RELIABILITY how m
- Page 183 and 184: 164 VALIDITY AND RELIABILITY operat
- Page 186 and 187: 7 Naturalistic and ethnographic res
- Page 188 and 189: ELEMENTS OF NATURALISTIC INQUIRY 16
122 SENSITIVE EDUCATIONAL <strong>RESEARCH</strong><br />
<br />
the nature of those who respond, in terms of<br />
representativeness or suitability.<br />
Networking: thisisakintosnowballsampling,<br />
wherein one set of contacts puts the researcher<br />
in touch with more contacts, who puts the<br />
researcher in touch with yet more contacts<br />
and so on. This is a widely used technique,<br />
though Lee (1993: 66) reports that it is not<br />
always easy for contacts to be passed on,<br />
as initial informants may be unwilling to<br />
divulge members of a close-knit community.<br />
On the other hand, Morrison (2006) reports<br />
that networking is a popular technique where<br />
it is difficult to penetrate a formal organization<br />
such as a school, if the gatekeepers (those<br />
who can grant or prevent access to others,<br />
e.g. the headteacher or senior staff) refuse<br />
access. He reports the extensive use of informal<br />
networks by researchers, in order to contact<br />
friends and professional associates, and, in<br />
turn, their friends and professional associates,<br />
thereby sidestepping the formal lines of contact<br />
through schools.<br />
Walford (2001: 36–47) sets out a four-step<br />
process of gaining access:<br />
1 Approach (gaining entry, perhaps through a<br />
mutual friend or colleague – a link person). In<br />
this context Walford (2001) cautions that an<br />
initial letter should be used only to gain an<br />
initial interview or an appointment, or even<br />
to arrange to telephone the headteacher in<br />
order to arrange an interview, not to conduct<br />
the research or to gain access.<br />
2 Interest (using a telephone call to arrange<br />
an initial interview). In this respect Walford<br />
(2001: 43) notes that headteachers like to<br />
talk, and so it is important to let them talk,<br />
even on the telephone when arranging an<br />
interview to discuss the research.<br />
3 Desire (overcoming objections and stressing<br />
the benefits of the research). As Walford<br />
(2001: 44) wisely comments: ‘after all, schools<br />
have purposes other than to act as research<br />
sites’. He makes the telling point that the<br />
research may actually benefit the school, but<br />
that the school may not realize this until it is<br />
pointed out. For example, a headteacher may<br />
wish to confide in a researcher, teachers may<br />
benefit from discussions with a researcher,<br />
students may benefit from being asked about<br />
their learning.<br />
4 Sale (where the participants agree to the<br />
research).<br />
Whitty and Edwards (1994: 22) argue that in<br />
order to overcome problems of access, ingenuity<br />
and even the temptation to use subterfuge could<br />
be considered: ‘denied co-operation initially by<br />
an independent school, we occasionally contacted<br />
some parents through their child’s primary school<br />
and then told the independent schools we already<br />
were getting some information about their pupils’.<br />
They also add that it is sometimes necessary<br />
for researchers to indicate that they are ‘on the<br />
same side’ as those being researched. 1 Indeed they<br />
report that ‘we were questioned often about our<br />
own views, and there were times when to be<br />
viewed suspiciously from one side proved helpful in<br />
gaining access to the other’ (Whitty and Edwards<br />
1994: 22). This harks back to Becker’s (1968)<br />
advice to researchers to decide whose side they<br />
are on.<br />
The use of snowball sampling builds in<br />
‘security’ (Lee 1993), as the contacts are those<br />
who are known and trusted by the members of<br />
the ‘snowball’. That said, this itself can lead to<br />
bias, as relationships between participants in the<br />
sample may consist of ‘reciprocity and transitivity’<br />
(Lee 1993: 67), i.e. participants may have close<br />
relationships with one another and may not wish<br />
to break these. Thus homogeneity of the sample’s<br />
attributes may result.<br />
Such snowball sampling may alter the<br />
research, for example changing random, stratified<br />
or proportionate sampling into convenience<br />
sampling, thereby compromising generalizability<br />
or generating the need to gain generalizability<br />
by synthesizing many case studies. Nevertheless,<br />
it often comes to a choice between accepting<br />
non-probability strategies or doing nothing.<br />
The issues of access to people in order to<br />
conduct sensitive research may require researchers<br />
to demonstrate a great deal of ingenuity and