12.01.2015 Views

RESEARCH METHOD COHEN ok

RESEARCH METHOD COHEN ok

RESEARCH METHOD COHEN ok

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

64 THE ETHICS OF EDUCATIONAL AND SOCIAL <strong>RESEARCH</strong><br />

media, for example, privacy is seriously violated.<br />

The more people there are who can learn about<br />

the information, the more concern there must be<br />

about privacy (see Diener and Crandall 1978).<br />

As is the case with most rights, privacy can<br />

be voluntarily relinquished. Research participants<br />

may choose to give up their right to privacy either<br />

by allowing a researcher access to sensitive topics<br />

or settings or by agreeing that the research report<br />

may identify them by name. The latter case at least<br />

would be an occasion where informed consent<br />

would need to be sought.<br />

Generally speaking, if researchers intend to<br />

probe into the private aspects or affairs of<br />

individuals, their intentions should be made clear<br />

and explicit and informed consent should be<br />

sought from those who are to be observed or<br />

scrutinized in private contexts. Other methods<br />

to protect participants are anonymity and<br />

confidentiality and our examination of these<br />

follows.<br />

Privacy is more than simple confidentiality<br />

(discussed below). The right to privacy means<br />

that a person has the right not to take part in<br />

the research, not to answer questions, not to be<br />

interviewed, not to have their home intruded into,<br />

not to answer telephone calls or emails, and to<br />

engage in private behaviour in their own private<br />

place without fear of being observed. It is freedom<br />

from as well as freedom for. Thisisfrequentlyan<br />

issue with intrusive journalism. Hence researchers<br />

may have an obligation to inform participants of<br />

their rights to refuse to take part in any or all of<br />

the research, to obtain permission to conduct the<br />

research, to limit the time needed for participation<br />

and to limit the observation to public behaviour.<br />

Anonymity<br />

Frankfort-Nachmias and Nachmias (1992) underline<br />

the need for confidentiality of participants’<br />

identities, and that any violations of this should<br />

be made with the agreement of the participants.<br />

The essence of anonymity is that information provided<br />

by participants should in no way reveal<br />

their identity. The obverse of this is, as we saw<br />

earlier, personal data that uniquely identify their<br />

supplier. A participant or subject is therefore considered<br />

anonymous when the researcher or another<br />

person cannot identify the participant or subject<br />

from the information provided. Where this<br />

situation holds, a participant’s privacy is guaranteed,<br />

no matter how personal or sensitive the<br />

information is. Thus a respondent completing a<br />

questionnaire that bears absolutely no identifying<br />

marks – names, addresses, occupational details<br />

or coding symbols – is ensured complete and total<br />

anonymity. A subject agreeing to a face-to-face interview,<br />

on the other hand, can in no way expect<br />

anonymity. At most, the interviewer can promise<br />

confidentiality. Non-traceability is an important<br />

matter, and this extends to aggregating data in<br />

some cases, so that an individual’s response is<br />

unknowable.<br />

The principal means of ensuring anonymity,<br />

then, is not using the names of the participants or<br />

any other personal means of identification. Further<br />

ways of achieving anonymity have been listed<br />

by Frankfort-Nachmias and Nachmias (1992), for<br />

example, the use of aliases, the use of codes for<br />

identifying people (to keep the information on<br />

individuals separate from access to them) and the<br />

use of password-protected files.<br />

These may work satisfactorily in most situations,<br />

but as Raffe and his colleagues (1989) have<br />

shown, there is sometimes the difficulty of<br />

maintaining an assurance of anonymity when,<br />

for example, combining data may uniquely<br />

identify an individual or institution or when<br />

there is access to incoming returns by support<br />

staff. Plummer (1983), likewise, refers to life<br />

studies in which names have been changed,<br />

places shifted, and fictional events added to<br />

prevent acquaintances of subjects discovering their<br />

identity. Although one can go a long way down<br />

this path, there is no absolute guarantee of total<br />

anonymity as far as life studies are concerned.<br />

In experimental research the experimenter is<br />

interested in ‘human’ behaviour rather than in<br />

the behaviour of specific individuals (Aronson and<br />

Carlsmith 1969). Consequently the researcher has<br />

absolutely no interest in linking the person as<br />

aunique,namedindividualtoactualbehaviour,<br />

and the research data can be transferred to coded,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!