12.01.2015 Views

RESEARCH METHOD COHEN ok

RESEARCH METHOD COHEN ok

RESEARCH METHOD COHEN ok

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

64 THE ETHICS OF EDUCATIONAL AND SOCIAL <strong>RESEARCH</strong><br />

media, for example, privacy is seriously violated.<br />

The more people there are who can learn about<br />

the information, the more concern there must be<br />

about privacy (see Diener and Crandall 1978).<br />

As is the case with most rights, privacy can<br />

be voluntarily relinquished. Research participants<br />

may choose to give up their right to privacy either<br />

by allowing a researcher access to sensitive topics<br />

or settings or by agreeing that the research report<br />

may identify them by name. The latter case at least<br />

would be an occasion where informed consent<br />

would need to be sought.<br />

Generally speaking, if researchers intend to<br />

probe into the private aspects or affairs of<br />

individuals, their intentions should be made clear<br />

and explicit and informed consent should be<br />

sought from those who are to be observed or<br />

scrutinized in private contexts. Other methods<br />

to protect participants are anonymity and<br />

confidentiality and our examination of these<br />

follows.<br />

Privacy is more than simple confidentiality<br />

(discussed below). The right to privacy means<br />

that a person has the right not to take part in<br />

the research, not to answer questions, not to be<br />

interviewed, not to have their home intruded into,<br />

not to answer telephone calls or emails, and to<br />

engage in private behaviour in their own private<br />

place without fear of being observed. It is freedom<br />

from as well as freedom for. Thisisfrequentlyan<br />

issue with intrusive journalism. Hence researchers<br />

may have an obligation to inform participants of<br />

their rights to refuse to take part in any or all of<br />

the research, to obtain permission to conduct the<br />

research, to limit the time needed for participation<br />

and to limit the observation to public behaviour.<br />

Anonymity<br />

Frankfort-Nachmias and Nachmias (1992) underline<br />

the need for confidentiality of participants’<br />

identities, and that any violations of this should<br />

be made with the agreement of the participants.<br />

The essence of anonymity is that information provided<br />

by participants should in no way reveal<br />

their identity. The obverse of this is, as we saw<br />

earlier, personal data that uniquely identify their<br />

supplier. A participant or subject is therefore considered<br />

anonymous when the researcher or another<br />

person cannot identify the participant or subject<br />

from the information provided. Where this<br />

situation holds, a participant’s privacy is guaranteed,<br />

no matter how personal or sensitive the<br />

information is. Thus a respondent completing a<br />

questionnaire that bears absolutely no identifying<br />

marks – names, addresses, occupational details<br />

or coding symbols – is ensured complete and total<br />

anonymity. A subject agreeing to a face-to-face interview,<br />

on the other hand, can in no way expect<br />

anonymity. At most, the interviewer can promise<br />

confidentiality. Non-traceability is an important<br />

matter, and this extends to aggregating data in<br />

some cases, so that an individual’s response is<br />

unknowable.<br />

The principal means of ensuring anonymity,<br />

then, is not using the names of the participants or<br />

any other personal means of identification. Further<br />

ways of achieving anonymity have been listed<br />

by Frankfort-Nachmias and Nachmias (1992), for<br />

example, the use of aliases, the use of codes for<br />

identifying people (to keep the information on<br />

individuals separate from access to them) and the<br />

use of password-protected files.<br />

These may work satisfactorily in most situations,<br />

but as Raffe and his colleagues (1989) have<br />

shown, there is sometimes the difficulty of<br />

maintaining an assurance of anonymity when,<br />

for example, combining data may uniquely<br />

identify an individual or institution or when<br />

there is access to incoming returns by support<br />

staff. Plummer (1983), likewise, refers to life<br />

studies in which names have been changed,<br />

places shifted, and fictional events added to<br />

prevent acquaintances of subjects discovering their<br />

identity. Although one can go a long way down<br />

this path, there is no absolute guarantee of total<br />

anonymity as far as life studies are concerned.<br />

In experimental research the experimenter is<br />

interested in ‘human’ behaviour rather than in<br />

the behaviour of specific individuals (Aronson and<br />

Carlsmith 1969). Consequently the researcher has<br />

absolutely no interest in linking the person as<br />

aunique,namedindividualtoactualbehaviour,<br />

and the research data can be transferred to coded,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!