RESEARCH METHOD COHEN ok
RESEARCH METHOD COHEN ok RESEARCH METHOD COHEN ok
SAMPLING AND ACCESS 123 forethought in their planning. Investigators have to be adroit in anticipating problems of access, and set up their studies in ways that circumvent such problems, preventing them from arising in the first place, e.g. by exploring their own institutions or personal situations, even if this compromises generalizability. Such anticipatory behaviour can lead to a glut of case studies, action research and accounts of their own institutions, as these are the only kinds of research possible, given the problem of access. Gatekeepers Access might be gained through gatekeepers, that is, those who control access. Lee (1993: 123) suggests that ‘social access crucially depends on establishing interpersonal trust. Gatekeepersplaya significant role in research, particularly in ethnographic research (Miller and Bell 2002: 53). They control access and re-access (Miller and Bell 2002: 55). They may provide or block access; they may steer the course of a piece of research, ‘shepherding the fieldworker in one direction or another’ (Hammersley and Atkinson 1983: 65), or exercise surveillance over the research. Gatekeepers may wish to avoid, contain, spread or control risk and therefore may bar access or make access conditional. Making research conditional may require researchers to change the nature of their original plans in terms of methodology, sampling, focus, dissemination, reliability and validity, reporting and control of data (Morrison 2006). Morrison (2006) found that in conducting sensitive educational research there were problems of gaining access to schools and teachers gaining permission to conduct the research (e.g. from school principals) resentment by principals people vetting which data could be used finding enough willing participants for the sample schools/institutions/people not wishing to divulge information about themselves schools/institutions not wishing to be identifiable, even with protections guaranteed local political factors that impinge on the school/educational institution teachers’/participants’ fear of being identified/traceable, even with protections guaranteed fear of participation by teachers (e.g. if they say critical matters about the school or others they could lose their contracts) unwillingness of teachers to be involved because of their workload the principal deciding on whether to involve the staff, without consultation with the staff schools’ fear of criticism/loss of face or reputation the sensitivity of the research – the issues being investigated the power/position of the researcher (e.g. if the researcher is a junior or senior member of staff or an influential person in education). Risk reduction may result in participants imposing conditions on research (e.g. on what information investigators may or may not use; to whom the data can be shown; what is ‘public’; what is ‘off the record’ (and what should be done with off-the-record remarks). It may also lead to surveillance/‘chaperoning’ of the researcher while the study is being conducted on site (Lee 1993: 125). Gatekeepers may want to ‘inspect, modify or suppress the published products of the research’ (Lee 1993: 128). They may also wish to use the research for their own ends, i.e. their involvement may not be selfless or disinterested, or they may wish for something in return, e.g. for the researcher to include in the study an area of interest to the gatekeeper, or to report directly – and maybe exclusively – to the gatekeeper. The researcher has to negotiate a potential minefield here, for example, not to be seen as an informer for the headteacher. As Walford (2001: 45) writes: ‘headteachers [may] suggest that researchers observe certain teachers whom they want information about’. Researchers may need to reassure participants that their data will not be given to the headteacher. Chapter 5
124 SENSITIVE EDUCATIONAL RESEARCH On the other hand, Lee (1993: 127) suggests that the researcher may have to make a few concessions in order to be able to undertake the investigation, i.e. that it is better to do a little of the gatekeeper’s bidding rather than not to be able to do the research at all. In addition to gatekeepers the researcher may find a ‘sponsor’ in the group being studied. A sponsor may provide access, information and support. A celebrated example of this is in the figure of ‘Doc’ in Whyte’s classic study of Street Corner Society (1993: the original study published in 1943). Here Doc, a leading gang figure in the Chicago street corner society, is quoted as saying (p. 292): You tell me what you want me to see, and we’ll arrange it. When you want some information, I’ll ask for it, and you listen. When you want to find out their philosophy of life, I’ll start an argument and get it for you ....Youwon’thaveanytrouble.Youcomeinas afriend. (Whyte 1993: 292) As Whyte writes: My relationship with Doc changed rapidly ....At first he was simply a key informant – and also my sponsor. As we spent more time together, I ceased to treat him as a passive informant. I discussed with him quite frankly what I was trying to do, what problems were puzzling me, and so on ...so that Doc became, in a real sense, a collaborator in the research. (Whyte 1993: 301) Whyte comments on how Doc was able to give him advice on how best to behave when meeting people as part of the research: Go easy on that ‘who’, ‘what’, ‘why’, ‘when’, ‘where’ stuff, Bill. You ask those questions and people will clam up on you. If people accept you, you can just hang around, and you’ll learn the answers in the long run without even having to ask the questions’ (Whyte 1993: 303) Indeed Doc played a role in the writing of the research: ‘As I wrote, I showed the various parts to Doc and went over them in detail. His criticisms were invaluable in my revision’ (p. 341). In his Box 5.1 Issues of sampling and access in sensitive research How to calculate the population and sample. How representative of the population the sample may or may not be. What kind of sample is desirable (e.g. random), but what kind may be the only sort that is practicable (e.g. snowball). How to use networks for reaching the sample, and what kinds of networks to utilize. How to research in a situation of threat to the participants (including the researcher). How to protect identities and threatened groups. How to contact the hard-to-reach. How to secure and sustain access. How to find and involve gatekeepers and sponsors. What to offer gatekeepers and sponsors. On what matters compromise may need to be negotiated. On what matters can there be no compromise. How to negotiate entry and sustained field relations. What services the researcher may provide. How to manage initial contacts with potential groups for study. 1993 edition, Whyte reflects on the study with the question as to whether he exploited Doc (p. 362); it is a salutary reminder of the essential reciprocity that might be involved in conducting sensitive research. In addressing issues of sampling and access, there are several points that arise from the discussion (Box 5.1). Much research stands or falls on the sampling. These points reinforce our view that, rather than barring the research altogether, compromises may have to be reached in sampling and access. It may be better to compromise rather than to abandon the research altogether. Ethical issues in sensitive research Adifficultyarisesinsensitiveresearchinthat researchers can be party to ‘guilty knowledge’ (De Laine 2000) and have ‘dirty hands’ (Klockars 1979) about deviant groups or members of a school
- Page 91 and 92: 72 THE ETHICS OF EDUCATIONAL AND SO
- Page 93 and 94: 74 THE ETHICS OF EDUCATIONAL AND SO
- Page 95 and 96: 76 THE ETHICS OF EDUCATIONAL AND SO
- Page 97 and 98: 3 Planning educational research Int
- Page 99 and 100: 80 PLANNING EDUCATIONAL RESEARCH t
- Page 101 and 102: 82 PLANNING EDUCATIONAL RESEARCH de
- Page 103 and 104: 84 PLANNING EDUCATIONAL RESEARCH Bo
- Page 105 and 106: 86 PLANNING EDUCATIONAL RESEARCH Bo
- Page 107 and 108: 88 PLANNING EDUCATIONAL RESEARCH Bo
- Page 109 and 110: 90 PLANNING EDUCATIONAL RESEARCH Bo
- Page 111 and 112: 92 PLANNING EDUCATIONAL RESEARCH Bo
- Page 113 and 114: 94 PLANNING EDUCATIONAL RESEARCH Bo
- Page 115 and 116: 96 PLANNING EDUCATIONAL RESEARCH Or
- Page 117 and 118: 98 PLANNING EDUCATIONAL RESEARCH Pa
- Page 119 and 120: 4 Sampling Introduction The quality
- Page 121 and 122: 102 SAMPLING sample of 200 might be
- Page 123 and 124: 104 SAMPLING Box 4.1 Sample size, c
- Page 125 and 126: 106 SAMPLING would be insufficient
- Page 127 and 128: 108 SAMPLING The formula assumes th
- Page 129 and 130: 110 SAMPLING school governors, scho
- Page 131 and 132: 112 SAMPLING terms of sex, a random
- Page 133 and 134: 114 SAMPLING the required sample si
- Page 135 and 136: 116 SAMPLING Snowball sampling In s
- Page 137 and 138: 118 SAMPLING the kind of sample (d
- Page 139 and 140: 120 SENSITIVE EDUCATIONAL RESEARCH
- Page 141: 122 SENSITIVE EDUCATIONAL RESEARCH
- Page 145 and 146: 126 SENSITIVE EDUCATIONAL RESEARCH
- Page 147 and 148: 128 SENSITIVE EDUCATIONAL RESEARCH
- Page 149 and 150: 130 SENSITIVE EDUCATIONAL RESEARCH
- Page 151 and 152: 132 SENSITIVE EDUCATIONAL RESEARCH
- Page 153 and 154: 134 VALIDITY AND RELIABILITY It is
- Page 155 and 156: 136 VALIDITY AND RELIABILITY using
- Page 157 and 158: 138 VALIDITY AND RELIABILITY includ
- Page 159 and 160: 140 VALIDITY AND RELIABILITY leadin
- Page 161 and 162: 142 VALIDITY AND RELIABILITY social
- Page 163 and 164: 144 VALIDITY AND RELIABILITY this i
- Page 165 and 166: 146 VALIDITY AND RELIABILITY prese
- Page 167 and 168: 148 VALIDITY AND RELIABILITY by ass
- Page 169 and 170: 150 VALIDITY AND RELIABILITY Validi
- Page 171 and 172: 152 VALIDITY AND RELIABILITY typica
- Page 173 and 174: 154 VALIDITY AND RELIABILITY people
- Page 175 and 176: 156 VALIDITY AND RELIABILITY
- Page 177 and 178: 158 VALIDITY AND RELIABILITY sensit
- Page 179 and 180: 160 VALIDITY AND RELIABILITY certif
- Page 181 and 182: 162 VALIDITY AND RELIABILITY how m
- Page 183 and 184: 164 VALIDITY AND RELIABILITY operat
- Page 186 and 187: 7 Naturalistic and ethnographic res
- Page 188 and 189: ELEMENTS OF NATURALISTIC INQUIRY 16
- Page 190 and 191: PLANNING NATURALISTIC RESEARCH 171
124 SENSITIVE EDUCATIONAL <strong>RESEARCH</strong><br />
On the other hand, Lee (1993: 127) suggests<br />
that the researcher may have to make a few<br />
concessions in order to be able to undertake the<br />
investigation, i.e. that it is better to do a little of<br />
the gatekeeper’s bidding rather than not to be able<br />
to do the research at all.<br />
In addition to gatekeepers the researcher may<br />
find a ‘sponsor’ in the group being studied. A<br />
sponsor may provide access, information and<br />
support. A celebrated example of this is in the<br />
figure of ‘Doc’ in Whyte’s classic study of Street<br />
Corner Society (1993: the original study published<br />
in 1943). Here Doc, a leading gang figure in the<br />
Chicago street corner society, is quoted as saying<br />
(p. 292):<br />
You tell me what you want me to see, and we’ll<br />
arrange it. When you want some information, I’ll ask<br />
for it, and you listen. When you want to find out their<br />
philosophy of life, I’ll start an argument and get it for<br />
you ....Youwon’thaveanytrouble.Youcomeinas<br />
afriend.<br />
(Whyte 1993: 292)<br />
As Whyte writes:<br />
My relationship with Doc changed rapidly ....At<br />
first he was simply a key informant – and also my<br />
sponsor. As we spent more time together, I ceased to<br />
treat him as a passive informant. I discussed with him<br />
quite frankly what I was trying to do, what problems<br />
were puzzling me, and so on ...so that Doc became,<br />
in a real sense, a collaborator in the research.<br />
(Whyte 1993: 301)<br />
Whyte comments on how Doc was able to give<br />
him advice on how best to behave when meeting<br />
people as part of the research:<br />
Go easy on that ‘who’, ‘what’, ‘why’, ‘when’, ‘where’<br />
stuff, Bill. You ask those questions and people will<br />
clam up on you. If people accept you, you can just<br />
hang around, and you’ll learn the answers in the long<br />
run without even having to ask the questions’<br />
(Whyte 1993: 303)<br />
Indeed Doc played a role in the writing of the<br />
research: ‘As I wrote, I showed the various parts to<br />
Doc and went over them in detail. His criticisms<br />
were invaluable in my revision’ (p. 341). In his<br />
Box 5.1<br />
Issues of sampling and access in sensitive research<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
How to calculate the population and sample.<br />
How representative of the population the sample<br />
may or may not be.<br />
What kind of sample is desirable (e.g. random), but<br />
what kind may be the only sort that is practicable<br />
(e.g. snowball).<br />
How to use networks for reaching the sample, and<br />
what kinds of networks to utilize.<br />
How to research in a situation of threat to the<br />
participants (including the researcher).<br />
How to protect identities and threatened groups.<br />
How to contact the hard-to-reach.<br />
How to secure and sustain access.<br />
How to find and involve gatekeepers and sponsors.<br />
What to offer gatekeepers and sponsors.<br />
On what matters compromise may need to be<br />
negotiated.<br />
On what matters can there be no compromise.<br />
How to negotiate entry and sustained field relations.<br />
What services the researcher may provide.<br />
How to manage initial contacts with potential<br />
groups for study.<br />
1993 edition, Whyte reflects on the study with the<br />
question as to whether he exploited Doc (p. 362);<br />
it is a salutary reminder of the essential reciprocity<br />
that might be involved in conducting sensitive<br />
research.<br />
In addressing issues of sampling and access, there<br />
are several points that arise from the discussion<br />
(Box 5.1).<br />
Much research stands or falls on the sampling.<br />
These points reinforce our view that, rather than<br />
barring the research altogether, compromises may<br />
have to be reached in sampling and access. It may<br />
be better to compromise rather than to abandon<br />
the research altogether.<br />
Ethical issues in sensitive research<br />
Adifficultyarisesinsensitiveresearchinthat<br />
researchers can be party to ‘guilty knowledge’ (De<br />
Laine 2000) and have ‘dirty hands’ (Klockars<br />
1979) about deviant groups or members of a school