12.01.2015 Views

RESEARCH METHOD COHEN ok

RESEARCH METHOD COHEN ok

RESEARCH METHOD COHEN ok

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ETHICAL DILEMMAS 65<br />

unnamed data sheets. As they comment, ‘the very<br />

impersonality of the process is a great advantage<br />

ethically because it eliminates some of the negative<br />

consequences of the invasion of privacy’ (Aronson<br />

and Carlsmith 1969).<br />

Confidentiality<br />

The second way of protecting a participant’s right<br />

to privacy is through the promise of confidentiality.<br />

This means that although researchers know who<br />

has provided the information or are able to identify<br />

participants from the information given, they will<br />

in no way make the connection known publicly;<br />

the boundaries surrounding the shared secret will<br />

be protected. The essence of the matter is the<br />

extent to which investigators keep faith with<br />

those who have helped them. It is generally at<br />

the access stage or at the point where researchers<br />

collect their data that they make their position<br />

clear to the hosts and/or subjects. They will thus<br />

be quite explicit in explaining to subjects what<br />

the meaning and limits of confidentiality are in<br />

relation to the particular research project. On the<br />

whole, the more sensitive, intimate or discrediting<br />

the information, the greater is the obligation on<br />

the researcher’s part to make sure that guarantees<br />

of confidentiality are carried out in spirit and letter.<br />

Promises must be kept.<br />

Kimmel (1988) notes that some potential<br />

respondents in research on sensitive topics<br />

will refuse to cooperate when an assurance of<br />

confidentiality is weak, vague, not understood,<br />

or thought likely to be breached. He concludes<br />

that the usefulness of data in sensitive research<br />

areas may be seriously affected by the researcher’s<br />

inability to provide a credible promise of<br />

confidentiality. Assurances do not appear to affect<br />

cooperation rates in innocuous studies perhaps<br />

because, as Kimmel suggests, there is expectation<br />

on the part of most potential respondents that<br />

confidentiality will be protected.<br />

Anumberoftechniqueshavebeendeveloped<br />

to allow public access to data and information<br />

without confidentiality being betrayed. These<br />

have been listed by Frankfort-Nachmias and<br />

Nachmias (1992) as follows:<br />

<br />

<br />

<br />

deletion of identifiers (for example, deleting<br />

the names, addresses or other means of identification<br />

from the data released on individuals)<br />

crude report categories (for example, releasing<br />

the year of birth rather than the specific date,<br />

profession but not the speciality within that<br />

profession, general information rather than<br />

specific)<br />

micro-aggregation (that is, the construction of<br />

‘average persons’ from data on individuals and<br />

the release of these data, rather than data on<br />

individuals)<br />

error inoculation (deliberately introducing<br />

errors into individual records while leaving<br />

the aggregate data unchanged).<br />

Cooper and Schindler (2001: 117) suggest that<br />

confidentiality can be protected by obtaining<br />

signed statements indicating non-disclosure of<br />

the research, restricting access to data which<br />

identify respondents, seeking the approval of<br />

the respondents before any disclosure about<br />

respondents takes place, non-disclosure of data<br />

(e.g. subsets that may be able to be combined to<br />

identify an individual).<br />

Betrayal<br />

The term ‘betrayal’ is usually applied to those<br />

occasions where data disclosed in confidence<br />

are revealed publicly in such a way as to cause<br />

embarrassment, anxiety or perhaps suffering to the<br />

subject or participant disclosing the information.<br />

It is a breach of trust, in contrast to confidentiality,<br />

and is often a consequence of selfish motives<br />

of either a personal or professional nature. As<br />

Plummer (1983) comments, ‘in sociology, there<br />

is something slightly awry when a sociologist can<br />

enter a group and a person’s life for a lengthy<br />

period, learn their most closely guarded secrets,<br />

and then expose all in a critical light to the<br />

public’ (see http://www.routledge.com/textbo<strong>ok</strong>s/<br />

9780415368780 – Chapter 2, file 2.4. ppt).<br />

One of the research methods that is perhaps<br />

most vulnerable to betrayal is action research.<br />

As Kelly (1989a) notes, this can produce several<br />

ethical problems. She says that if we treat teachers<br />

Chapter 2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!