12.01.2015 Views

RESEARCH METHOD COHEN ok

RESEARCH METHOD COHEN ok

RESEARCH METHOD COHEN ok

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

SAMPLING AND ACCESS 123<br />

forethought in their planning. Investigators have<br />

to be adroit in anticipating problems of access, and<br />

set up their studies in ways that circumvent such<br />

problems, preventing them from arising in the<br />

first place, e.g. by exploring their own institutions<br />

or personal situations, even if this compromises<br />

generalizability. Such anticipatory behaviour can<br />

lead to a glut of case studies, action research and<br />

accounts of their own institutions, as these are the<br />

only kinds of research possible, given the problem<br />

of access.<br />

Gatekeepers<br />

Access might be gained through gatekeepers, that<br />

is, those who control access. Lee (1993: 123)<br />

suggests that ‘social access crucially depends on<br />

establishing interpersonal trust. Gatekeepersplaya<br />

significant role in research, particularly in ethnographic<br />

research (Miller and Bell 2002: 53). They<br />

control access and re-access (Miller and Bell<br />

2002: 55). They may provide or block access;<br />

they may steer the course of a piece of research,<br />

‘shepherding the fieldworker in one direction or<br />

another’ (Hammersley and Atkinson 1983: 65), or<br />

exercise surveillance over the research.<br />

Gatekeepers may wish to avoid, contain, spread<br />

or control risk and therefore may bar access<br />

or make access conditional. Making research<br />

conditional may require researchers to change<br />

the nature of their original plans in terms of<br />

methodology, sampling, focus, dissemination,<br />

reliability and validity, reporting and control of<br />

data (Morrison 2006).<br />

Morrison (2006) found that in conducting<br />

sensitive educational research there were problems<br />

of<br />

gaining access to schools and teachers<br />

gaining permission to conduct the research<br />

(e.g. from school principals)<br />

resentment by principals<br />

people vetting which data could be used<br />

finding enough willing participants for the<br />

sample<br />

schools/institutions/people not wishing to<br />

divulge information about themselves<br />

schools/institutions not wishing to be identifiable,<br />

even with protections guaranteed<br />

local political factors that impinge on the<br />

school/educational institution<br />

teachers’/participants’ fear of being identified/traceable,<br />

even with protections guaranteed<br />

fear of participation by teachers (e.g. if they<br />

say critical matters about the school or others<br />

they could lose their contracts)<br />

unwillingness of teachers to be involved<br />

because of their workload<br />

the principal deciding on whether to involve<br />

the staff, without consultation with the staff<br />

schools’ fear of criticism/loss of face or<br />

reputation<br />

the sensitivity of the research – the issues being<br />

investigated<br />

the power/position of the researcher (e.g. if the<br />

researcher is a junior or senior member of staff<br />

or an influential person in education).<br />

Risk reduction may result in participants<br />

imposing conditions on research (e.g. on what<br />

information investigators may or may not use; to<br />

whom the data can be shown; what is ‘public’;<br />

what is ‘off the record’ (and what should be<br />

done with off-the-record remarks). It may also<br />

lead to surveillance/‘chaperoning’ of the researcher<br />

while the study is being conducted on site (Lee<br />

1993: 125).<br />

Gatekeepers may want to ‘inspect, modify or<br />

suppress the published products of the research’<br />

(Lee 1993: 128). They may also wish to use the<br />

research for their own ends, i.e. their involvement<br />

may not be selfless or disinterested, or they may<br />

wish for something in return, e.g. for the researcher<br />

to include in the study an area of interest to the<br />

gatekeeper, or to report directly – and maybe exclusively<br />

– to the gatekeeper. The researcher has to<br />

negotiate a potential minefield here, for example,<br />

not to be seen as an informer for the headteacher.<br />

As Walford (2001: 45) writes: ‘headteachers [may]<br />

suggest that researchers observe certain teachers<br />

whom they want information about’. Researchers<br />

may need to reassure participants that their data<br />

will not be given to the headteacher.<br />

Chapter 5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!