View/Open - Scholarly Commons Home
View/Open - Scholarly Commons Home
View/Open - Scholarly Commons Home
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
and an information sheet outlining the process for completing the survey with their<br />
anonymous login code. An entry form for a competition to win one of 5 iPods and a<br />
reply paid envelope was also included. For those young people under the age of 16<br />
years, the letter was addressed to the parent/ caregiver with a request to pass the<br />
information to their child to complete if they agreed to their participation. As well as the<br />
contact details for the research team an 0800 number was set up that was diverted to<br />
my mobile phone for 24hour support if required. A follow-up reminder was sent to all<br />
participants at three to four weeks and three months after the initial contact. This had<br />
been decided in the planning stage as a review of the literature had identified that<br />
reminders as well as incentives improved response rates (Kaplowitz et al., 2004; Rosoff<br />
et al., 2005).<br />
The data collection period was initially set for three months, however<br />
unanticipated problems occurred for some participants in accessing the survey. The<br />
access issues were more common with laptops. The cause was identified as being the<br />
high security settings of some computer software which blocked the site. This hadn’t<br />
been evident during the testing of the survey, predominantly on hospital computers and<br />
laptops which allowed access. The web-based survey had been developed for the two<br />
Youth Health surveys where the hand-held internet tablets were part of an integrated<br />
system i.e. connected by a router to a laptop used as a server for the survey software<br />
programme. The same website development company set up and hosted the site for this<br />
survey and the difficulties with access were not foreseen.<br />
In discussion with the hosting company it was felt that the best option was to<br />
advise those young people experiencing problems how to turn off the “ pop-up<br />
blockers” and with the second mail out a slip was enclosed explaining the simple steps<br />
to bypass the security settings. This was successful for some but did not allow access for<br />
all. The web development company was ultimately able to refine the software<br />
30