RESEARCH METHOD COHEN ok
RESEARCH METHOD COHEN ok RESEARCH METHOD COHEN ok
CONCLUSION 131 female; powerful people may feel insulted by being interviewed by a lowly, novice research assistant. Interviewer effects also concern the expectations that the interviewers may have of the interview (Lee 1993: 99). For example, a researcher may feel apprehensive about, or uncomfortable with, an interview about a sensitive matter. Bradburn and Sudman (1979, in Lee 1993: 101) report that interviewers who did not anticipate difficulties in the interview achieved a 5–30percenthigherlevelofreportingonsensitive topics than those who anticipated difficulties. This suggests the need for interviewer training. Lee (1993: 102–14) suggests several issues to be addressed in conducting sensitive interviews: How to approach the topic (in order to prevent participants’ inhibitions and to help them address the issue in their preferred way). Here the advice is to let the topic ‘emerge gradually over the course of the interview’ (Lee 1993: 103) and to establish trust and informed consent. How to deal with contradictions, complexities and emotions (which may require training and supervision of interviewers); how to adopt an accepting and non-judgemental stance, how to handle respondents who may not be people whom interviewers particularly like or with whom they agree). How to handle the operation of power and control in the interview: (a) where differences of power and status operate, where the interviewer has greater or lesser status than the respondent and where there is equal status between the interviewer and the respondent; (b) how to handle the situation where the interviewer wants information but is in no position to command that this be given and where the respondent may or may not wish to disclose information; (c) how to handle the situation wherein powerful people use the interview as an opportunity for lengthy and perhaps irrelevant self-indulgence; (d) how to handle the situation in which the interviewer, by the end of the session, has information that is sensitive and could give the interviewer power over the respondent and make the respondent feel vulnerable; (e) what the interviewer should do with information that may act against the interests of the people who gave it (e.g. if some groups in society say that they are not clever enough to handle higher or further education); and (f) how to handle the conduct of the interview (e.g. conversational, formal, highly structured, highly directed). Handling the conditions under which the exchange takes place Lee (1993: 112) suggests that interviews on sensitive matters should ‘have a one-off character’, i.e. the respondent should feel that the interviewer and the interviewee may never meet again. This can secure trust, and can lead to greater disclosure than in a situation where a closer relationship between interviewer and interviewee exists. On the other hand, this does not support the development of a collaborative research relationship (Lee 1993: 113). Much educational research is more or less sensitive; it is for the researcher to decide how to approach the issue of sensitivities and how to address their many forms, allegiances, ethics, access, politics and consequences. Conclusion In approaching educational research, our advice is to consider it to be far from a neat, clean, tidy, unproblematic and neutral process, but to regard it as shot through with actual and potential sensitivities. With this in mind we have resisted the temptation to provide a list of sensitive topics, as this could be simplistic and overlook the fundamental issue which is that it is the social context of the research that makes the research sensitive. What may appear to the researcher to be a bland and neutral study can raise deep sensitivities in the minds of the participants. We have argued that it is these that often render the research sensitive rather than the selection of topics of focus. Researchers have to consider the likely or possible effects of the Chapter 5
132 SENSITIVE EDUCATIONAL RESEARCH research project, conduct, outcomes, reporting and dissemination not only on themselves but also on the participants, on those connected to the participants and on those affected by, or with a stakeholder interest in, the research (i.e. to consider ‘consequential validity’: the effects of the research). This suggests that it is wise to be cautious and to regard all educational research as potentially sensitive. There are several questions that can be asked by researchers, in their planning, conduct, reporting and dissemination of their studies, and we present these in Box 5.4. These questions reinforce the importance of regarding ethics as ‘situated’ (Simons and Usher 2000), i.e. contingent on particular situations rather than largely on ethical codes and guidelines. In this respect sensitive educational research is like any other research, but sharper in the criticality of ethical issues. Also, behind many of these questions of sensitivity lurks the nagging issue of power: who has it, who does not, how it circulates around research situations (and with what consequences), and how it should be addressed. Sensitive educational research is often as much a power play as it is substantive. We advise researchers to regard most educational research as involving sensitivities; these need to be identified and addressed. Box 5.4 Key questions in considering sensitive educational research What renders the research sensitive What are the obligations of the researcher, to whom, and howwillthesebeaddressedHowdotheseobligations manifest themselves What is the likely effect of this research (at all stages) to be on participants (individuals and groups), stakeholders, the researcher, the community Who will be affected by the research, and how Who is being discussed and addressed in the research What rights of reply and control do participants have in the research What are the ethical issues that are rendered more acute in the research Over what matters in the planning, focus, conduct, sampling, instrumentation, methodology, reliability, analysis, reporting and dissemination might the researcher have to compromise in order to effect the research On what can there be compromise On what can there be no compromise What securities, protections (and from what), liabilities and indemnifications are there in the research, and for whom How can these be addressed Who is the research for Who are the beneficiaries of the research Who are the winners and losers in the research (and about what issues) What are the risks and benefits of the research, and for whom What will the research ‘deliver’ and do Should researchers declare their own values, and challenge those with which they disagree or consider to be abhorrent What might be the consequences, repercussions and backlash from the research, and for whom What sanctions might there be in connection with the research What has to be secured in a contractual agreement, and what is deliberately left out What guarantees must and should the researcher give to the participants What procedures for monitoring and accountability must there be in the research What must and must not, should and should not, may or may not, could or could not be disclosed in the research Should the research be covert, overt, partially overt, partially covert, honest in its disclosure of intentions Should participants be identifiable and identified What if identification is unavoidable How will access and sampling be secured and secure respectively How will access be sustained over time Who are the gatekeepers and how reliable are they
- Page 99 and 100: 80 PLANNING EDUCATIONAL RESEARCH t
- Page 101 and 102: 82 PLANNING EDUCATIONAL RESEARCH de
- Page 103 and 104: 84 PLANNING EDUCATIONAL RESEARCH Bo
- Page 105 and 106: 86 PLANNING EDUCATIONAL RESEARCH Bo
- Page 107 and 108: 88 PLANNING EDUCATIONAL RESEARCH Bo
- Page 109 and 110: 90 PLANNING EDUCATIONAL RESEARCH Bo
- Page 111 and 112: 92 PLANNING EDUCATIONAL RESEARCH Bo
- Page 113 and 114: 94 PLANNING EDUCATIONAL RESEARCH Bo
- Page 115 and 116: 96 PLANNING EDUCATIONAL RESEARCH Or
- Page 117 and 118: 98 PLANNING EDUCATIONAL RESEARCH Pa
- Page 119 and 120: 4 Sampling Introduction The quality
- Page 121 and 122: 102 SAMPLING sample of 200 might be
- Page 123 and 124: 104 SAMPLING Box 4.1 Sample size, c
- Page 125 and 126: 106 SAMPLING would be insufficient
- Page 127 and 128: 108 SAMPLING The formula assumes th
- Page 129 and 130: 110 SAMPLING school governors, scho
- Page 131 and 132: 112 SAMPLING terms of sex, a random
- Page 133 and 134: 114 SAMPLING the required sample si
- Page 135 and 136: 116 SAMPLING Snowball sampling In s
- Page 137 and 138: 118 SAMPLING the kind of sample (d
- Page 139 and 140: 120 SENSITIVE EDUCATIONAL RESEARCH
- Page 141 and 142: 122 SENSITIVE EDUCATIONAL RESEARCH
- Page 143 and 144: 124 SENSITIVE EDUCATIONAL RESEARCH
- Page 145 and 146: 126 SENSITIVE EDUCATIONAL RESEARCH
- Page 147 and 148: 128 SENSITIVE EDUCATIONAL RESEARCH
- Page 149: 130 SENSITIVE EDUCATIONAL RESEARCH
- Page 153 and 154: 134 VALIDITY AND RELIABILITY It is
- Page 155 and 156: 136 VALIDITY AND RELIABILITY using
- Page 157 and 158: 138 VALIDITY AND RELIABILITY includ
- Page 159 and 160: 140 VALIDITY AND RELIABILITY leadin
- Page 161 and 162: 142 VALIDITY AND RELIABILITY social
- Page 163 and 164: 144 VALIDITY AND RELIABILITY this i
- Page 165 and 166: 146 VALIDITY AND RELIABILITY prese
- Page 167 and 168: 148 VALIDITY AND RELIABILITY by ass
- Page 169 and 170: 150 VALIDITY AND RELIABILITY Validi
- Page 171 and 172: 152 VALIDITY AND RELIABILITY typica
- Page 173 and 174: 154 VALIDITY AND RELIABILITY people
- Page 175 and 176: 156 VALIDITY AND RELIABILITY
- Page 177 and 178: 158 VALIDITY AND RELIABILITY sensit
- Page 179 and 180: 160 VALIDITY AND RELIABILITY certif
- Page 181 and 182: 162 VALIDITY AND RELIABILITY how m
- Page 183 and 184: 164 VALIDITY AND RELIABILITY operat
- Page 186 and 187: 7 Naturalistic and ethnographic res
- Page 188 and 189: ELEMENTS OF NATURALISTIC INQUIRY 16
- Page 190 and 191: PLANNING NATURALISTIC RESEARCH 171
- Page 192 and 193: PLANNING NATURALISTIC RESEARCH 173
- Page 194 and 195: PLANNING NATURALISTIC RESEARCH 175
- Page 196 and 197: PLANNING NATURALISTIC RESEARCH 177
- Page 198 and 199: PLANNING NATURALISTIC RESEARCH 179
132 SENSITIVE EDUCATIONAL <strong>RESEARCH</strong><br />
research project, conduct, outcomes, reporting<br />
and dissemination not only on themselves but<br />
also on the participants, on those connected to<br />
the participants and on those affected by, or with<br />
a stakeholder interest in, the research (i.e. to<br />
consider ‘consequential validity’: the effects of the<br />
research). This suggests that it is wise to be cautious<br />
and to regard all educational research as potentially<br />
sensitive. There are several questions that can be<br />
asked by researchers, in their planning, conduct,<br />
reporting and dissemination of their studies, and<br />
we present these in Box 5.4.<br />
These questions reinforce the importance of<br />
regarding ethics as ‘situated’ (Simons and Usher<br />
2000), i.e. contingent on particular situations<br />
rather than largely on ethical codes and guidelines.<br />
In this respect sensitive educational research<br />
is like any other research, but sharper in the<br />
criticality of ethical issues. Also, behind many of<br />
these questions of sensitivity lurks the nagging<br />
issue of power: who has it, who does not,<br />
how it circulates around research situations (and<br />
with what consequences), and how it should be<br />
addressed. Sensitive educational research is often<br />
as much a power play as it is substantive. We advise<br />
researchers to regard most educational research as<br />
involving sensitivities; these need to be identified<br />
and addressed.<br />
Box 5.4<br />
Key questions in considering sensitive educational research<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
What renders the research sensitive<br />
What are the obligations of the researcher, to whom, and howwillthesebeaddressedHowdotheseobligations<br />
manifest themselves<br />
What is the likely effect of this research (at all stages) to be on participants (individuals and groups), stakeholders, the<br />
researcher, the community Who will be affected by the research, and how<br />
Who is being discussed and addressed in the research<br />
What rights of reply and control do participants have in the research<br />
What are the ethical issues that are rendered more acute in the research<br />
Over what matters in the planning, focus, conduct, sampling, instrumentation, methodology, reliability, analysis,<br />
reporting and dissemination might the researcher have to compromise in order to effect the research On what can<br />
there be compromise On what can there be no compromise<br />
What securities, protections (and from what), liabilities and indemnifications are there in the research, and for whom<br />
How can these be addressed<br />
Who is the research for Who are the beneficiaries of the research Who are the winners and losers in the research<br />
(and about what issues)<br />
What are the risks and benefits of the research, and for whom What will the research ‘deliver’ and do<br />
Should researchers declare their own values, and challenge those with which they disagree or consider to be abhorrent<br />
What might be the consequences, repercussions and backlash from the research, and for whom<br />
What sanctions might there be in connection with the research<br />
What has to be secured in a contractual agreement, and what is deliberately left out<br />
What guarantees must and should the researcher give to the participants<br />
What procedures for monitoring and accountability must there be in the research<br />
What must and must not, should and should not, may or may not, could or could not be disclosed in the research<br />
Should the research be covert, overt, partially overt, partially covert, honest in its disclosure of intentions<br />
Should participants be identifiable and identified What if identification is unavoidable<br />
How will access and sampling be secured and secure respectively<br />
How will access be sustained over time<br />
Who are the gatekeepers and how reliable are they