RESEARCH METHOD COHEN ok

RESEARCH METHOD COHEN ok RESEARCH METHOD COHEN ok

12.01.2015 Views

SAMPLING AND ACCESS 123 forethought in their planning. Investigators have to be adroit in anticipating problems of access, and set up their studies in ways that circumvent such problems, preventing them from arising in the first place, e.g. by exploring their own institutions or personal situations, even if this compromises generalizability. Such anticipatory behaviour can lead to a glut of case studies, action research and accounts of their own institutions, as these are the only kinds of research possible, given the problem of access. Gatekeepers Access might be gained through gatekeepers, that is, those who control access. Lee (1993: 123) suggests that ‘social access crucially depends on establishing interpersonal trust. Gatekeepersplaya significant role in research, particularly in ethnographic research (Miller and Bell 2002: 53). They control access and re-access (Miller and Bell 2002: 55). They may provide or block access; they may steer the course of a piece of research, ‘shepherding the fieldworker in one direction or another’ (Hammersley and Atkinson 1983: 65), or exercise surveillance over the research. Gatekeepers may wish to avoid, contain, spread or control risk and therefore may bar access or make access conditional. Making research conditional may require researchers to change the nature of their original plans in terms of methodology, sampling, focus, dissemination, reliability and validity, reporting and control of data (Morrison 2006). Morrison (2006) found that in conducting sensitive educational research there were problems of gaining access to schools and teachers gaining permission to conduct the research (e.g. from school principals) resentment by principals people vetting which data could be used finding enough willing participants for the sample schools/institutions/people not wishing to divulge information about themselves schools/institutions not wishing to be identifiable, even with protections guaranteed local political factors that impinge on the school/educational institution teachers’/participants’ fear of being identified/traceable, even with protections guaranteed fear of participation by teachers (e.g. if they say critical matters about the school or others they could lose their contracts) unwillingness of teachers to be involved because of their workload the principal deciding on whether to involve the staff, without consultation with the staff schools’ fear of criticism/loss of face or reputation the sensitivity of the research – the issues being investigated the power/position of the researcher (e.g. if the researcher is a junior or senior member of staff or an influential person in education). Risk reduction may result in participants imposing conditions on research (e.g. on what information investigators may or may not use; to whom the data can be shown; what is ‘public’; what is ‘off the record’ (and what should be done with off-the-record remarks). It may also lead to surveillance/‘chaperoning’ of the researcher while the study is being conducted on site (Lee 1993: 125). Gatekeepers may want to ‘inspect, modify or suppress the published products of the research’ (Lee 1993: 128). They may also wish to use the research for their own ends, i.e. their involvement may not be selfless or disinterested, or they may wish for something in return, e.g. for the researcher to include in the study an area of interest to the gatekeeper, or to report directly – and maybe exclusively – to the gatekeeper. The researcher has to negotiate a potential minefield here, for example, not to be seen as an informer for the headteacher. As Walford (2001: 45) writes: ‘headteachers [may] suggest that researchers observe certain teachers whom they want information about’. Researchers may need to reassure participants that their data will not be given to the headteacher. Chapter 5

124 SENSITIVE EDUCATIONAL RESEARCH On the other hand, Lee (1993: 127) suggests that the researcher may have to make a few concessions in order to be able to undertake the investigation, i.e. that it is better to do a little of the gatekeeper’s bidding rather than not to be able to do the research at all. In addition to gatekeepers the researcher may find a ‘sponsor’ in the group being studied. A sponsor may provide access, information and support. A celebrated example of this is in the figure of ‘Doc’ in Whyte’s classic study of Street Corner Society (1993: the original study published in 1943). Here Doc, a leading gang figure in the Chicago street corner society, is quoted as saying (p. 292): You tell me what you want me to see, and we’ll arrange it. When you want some information, I’ll ask for it, and you listen. When you want to find out their philosophy of life, I’ll start an argument and get it for you ....Youwon’thaveanytrouble.Youcomeinas afriend. (Whyte 1993: 292) As Whyte writes: My relationship with Doc changed rapidly ....At first he was simply a key informant – and also my sponsor. As we spent more time together, I ceased to treat him as a passive informant. I discussed with him quite frankly what I was trying to do, what problems were puzzling me, and so on ...so that Doc became, in a real sense, a collaborator in the research. (Whyte 1993: 301) Whyte comments on how Doc was able to give him advice on how best to behave when meeting people as part of the research: Go easy on that ‘who’, ‘what’, ‘why’, ‘when’, ‘where’ stuff, Bill. You ask those questions and people will clam up on you. If people accept you, you can just hang around, and you’ll learn the answers in the long run without even having to ask the questions’ (Whyte 1993: 303) Indeed Doc played a role in the writing of the research: ‘As I wrote, I showed the various parts to Doc and went over them in detail. His criticisms were invaluable in my revision’ (p. 341). In his Box 5.1 Issues of sampling and access in sensitive research How to calculate the population and sample. How representative of the population the sample may or may not be. What kind of sample is desirable (e.g. random), but what kind may be the only sort that is practicable (e.g. snowball). How to use networks for reaching the sample, and what kinds of networks to utilize. How to research in a situation of threat to the participants (including the researcher). How to protect identities and threatened groups. How to contact the hard-to-reach. How to secure and sustain access. How to find and involve gatekeepers and sponsors. What to offer gatekeepers and sponsors. On what matters compromise may need to be negotiated. On what matters can there be no compromise. How to negotiate entry and sustained field relations. What services the researcher may provide. How to manage initial contacts with potential groups for study. 1993 edition, Whyte reflects on the study with the question as to whether he exploited Doc (p. 362); it is a salutary reminder of the essential reciprocity that might be involved in conducting sensitive research. In addressing issues of sampling and access, there are several points that arise from the discussion (Box 5.1). Much research stands or falls on the sampling. These points reinforce our view that, rather than barring the research altogether, compromises may have to be reached in sampling and access. It may be better to compromise rather than to abandon the research altogether. Ethical issues in sensitive research Adifficultyarisesinsensitiveresearchinthat researchers can be party to ‘guilty knowledge’ (De Laine 2000) and have ‘dirty hands’ (Klockars 1979) about deviant groups or members of a school

124 SENSITIVE EDUCATIONAL <strong>RESEARCH</strong><br />

On the other hand, Lee (1993: 127) suggests<br />

that the researcher may have to make a few<br />

concessions in order to be able to undertake the<br />

investigation, i.e. that it is better to do a little of<br />

the gatekeeper’s bidding rather than not to be able<br />

to do the research at all.<br />

In addition to gatekeepers the researcher may<br />

find a ‘sponsor’ in the group being studied. A<br />

sponsor may provide access, information and<br />

support. A celebrated example of this is in the<br />

figure of ‘Doc’ in Whyte’s classic study of Street<br />

Corner Society (1993: the original study published<br />

in 1943). Here Doc, a leading gang figure in the<br />

Chicago street corner society, is quoted as saying<br />

(p. 292):<br />

You tell me what you want me to see, and we’ll<br />

arrange it. When you want some information, I’ll ask<br />

for it, and you listen. When you want to find out their<br />

philosophy of life, I’ll start an argument and get it for<br />

you ....Youwon’thaveanytrouble.Youcomeinas<br />

afriend.<br />

(Whyte 1993: 292)<br />

As Whyte writes:<br />

My relationship with Doc changed rapidly ....At<br />

first he was simply a key informant – and also my<br />

sponsor. As we spent more time together, I ceased to<br />

treat him as a passive informant. I discussed with him<br />

quite frankly what I was trying to do, what problems<br />

were puzzling me, and so on ...so that Doc became,<br />

in a real sense, a collaborator in the research.<br />

(Whyte 1993: 301)<br />

Whyte comments on how Doc was able to give<br />

him advice on how best to behave when meeting<br />

people as part of the research:<br />

Go easy on that ‘who’, ‘what’, ‘why’, ‘when’, ‘where’<br />

stuff, Bill. You ask those questions and people will<br />

clam up on you. If people accept you, you can just<br />

hang around, and you’ll learn the answers in the long<br />

run without even having to ask the questions’<br />

(Whyte 1993: 303)<br />

Indeed Doc played a role in the writing of the<br />

research: ‘As I wrote, I showed the various parts to<br />

Doc and went over them in detail. His criticisms<br />

were invaluable in my revision’ (p. 341). In his<br />

Box 5.1<br />

Issues of sampling and access in sensitive research<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

How to calculate the population and sample.<br />

How representative of the population the sample<br />

may or may not be.<br />

What kind of sample is desirable (e.g. random), but<br />

what kind may be the only sort that is practicable<br />

(e.g. snowball).<br />

How to use networks for reaching the sample, and<br />

what kinds of networks to utilize.<br />

How to research in a situation of threat to the<br />

participants (including the researcher).<br />

How to protect identities and threatened groups.<br />

How to contact the hard-to-reach.<br />

How to secure and sustain access.<br />

How to find and involve gatekeepers and sponsors.<br />

What to offer gatekeepers and sponsors.<br />

On what matters compromise may need to be<br />

negotiated.<br />

On what matters can there be no compromise.<br />

How to negotiate entry and sustained field relations.<br />

What services the researcher may provide.<br />

How to manage initial contacts with potential<br />

groups for study.<br />

1993 edition, Whyte reflects on the study with the<br />

question as to whether he exploited Doc (p. 362);<br />

it is a salutary reminder of the essential reciprocity<br />

that might be involved in conducting sensitive<br />

research.<br />

In addressing issues of sampling and access, there<br />

are several points that arise from the discussion<br />

(Box 5.1).<br />

Much research stands or falls on the sampling.<br />

These points reinforce our view that, rather than<br />

barring the research altogether, compromises may<br />

have to be reached in sampling and access. It may<br />

be better to compromise rather than to abandon<br />

the research altogether.<br />

Ethical issues in sensitive research<br />

Adifficultyarisesinsensitiveresearchinthat<br />

researchers can be party to ‘guilty knowledge’ (De<br />

Laine 2000) and have ‘dirty hands’ (Klockars<br />

1979) about deviant groups or members of a school

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!