12.01.2015 Views

RESEARCH METHOD COHEN ok

RESEARCH METHOD COHEN ok

RESEARCH METHOD COHEN ok

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ETHICAL DILEMMAS 65<br />

unnamed data sheets. As they comment, ‘the very<br />

impersonality of the process is a great advantage<br />

ethically because it eliminates some of the negative<br />

consequences of the invasion of privacy’ (Aronson<br />

and Carlsmith 1969).<br />

Confidentiality<br />

The second way of protecting a participant’s right<br />

to privacy is through the promise of confidentiality.<br />

This means that although researchers know who<br />

has provided the information or are able to identify<br />

participants from the information given, they will<br />

in no way make the connection known publicly;<br />

the boundaries surrounding the shared secret will<br />

be protected. The essence of the matter is the<br />

extent to which investigators keep faith with<br />

those who have helped them. It is generally at<br />

the access stage or at the point where researchers<br />

collect their data that they make their position<br />

clear to the hosts and/or subjects. They will thus<br />

be quite explicit in explaining to subjects what<br />

the meaning and limits of confidentiality are in<br />

relation to the particular research project. On the<br />

whole, the more sensitive, intimate or discrediting<br />

the information, the greater is the obligation on<br />

the researcher’s part to make sure that guarantees<br />

of confidentiality are carried out in spirit and letter.<br />

Promises must be kept.<br />

Kimmel (1988) notes that some potential<br />

respondents in research on sensitive topics<br />

will refuse to cooperate when an assurance of<br />

confidentiality is weak, vague, not understood,<br />

or thought likely to be breached. He concludes<br />

that the usefulness of data in sensitive research<br />

areas may be seriously affected by the researcher’s<br />

inability to provide a credible promise of<br />

confidentiality. Assurances do not appear to affect<br />

cooperation rates in innocuous studies perhaps<br />

because, as Kimmel suggests, there is expectation<br />

on the part of most potential respondents that<br />

confidentiality will be protected.<br />

Anumberoftechniqueshavebeendeveloped<br />

to allow public access to data and information<br />

without confidentiality being betrayed. These<br />

have been listed by Frankfort-Nachmias and<br />

Nachmias (1992) as follows:<br />

<br />

<br />

<br />

deletion of identifiers (for example, deleting<br />

the names, addresses or other means of identification<br />

from the data released on individuals)<br />

crude report categories (for example, releasing<br />

the year of birth rather than the specific date,<br />

profession but not the speciality within that<br />

profession, general information rather than<br />

specific)<br />

micro-aggregation (that is, the construction of<br />

‘average persons’ from data on individuals and<br />

the release of these data, rather than data on<br />

individuals)<br />

error inoculation (deliberately introducing<br />

errors into individual records while leaving<br />

the aggregate data unchanged).<br />

Cooper and Schindler (2001: 117) suggest that<br />

confidentiality can be protected by obtaining<br />

signed statements indicating non-disclosure of<br />

the research, restricting access to data which<br />

identify respondents, seeking the approval of<br />

the respondents before any disclosure about<br />

respondents takes place, non-disclosure of data<br />

(e.g. subsets that may be able to be combined to<br />

identify an individual).<br />

Betrayal<br />

The term ‘betrayal’ is usually applied to those<br />

occasions where data disclosed in confidence<br />

are revealed publicly in such a way as to cause<br />

embarrassment, anxiety or perhaps suffering to the<br />

subject or participant disclosing the information.<br />

It is a breach of trust, in contrast to confidentiality,<br />

and is often a consequence of selfish motives<br />

of either a personal or professional nature. As<br />

Plummer (1983) comments, ‘in sociology, there<br />

is something slightly awry when a sociologist can<br />

enter a group and a person’s life for a lengthy<br />

period, learn their most closely guarded secrets,<br />

and then expose all in a critical light to the<br />

public’ (see http://www.routledge.com/textbo<strong>ok</strong>s/<br />

9780415368780 – Chapter 2, file 2.4. ppt).<br />

One of the research methods that is perhaps<br />

most vulnerable to betrayal is action research.<br />

As Kelly (1989a) notes, this can produce several<br />

ethical problems. She says that if we treat teachers<br />

Chapter 2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!