10.07.2015 Views

essential-guide-to-qualitative-in-organizational-research

essential-guide-to-qualitative-in-organizational-research

essential-guide-to-qualitative-in-organizational-research

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

26 –––––––––– QUALITATIVE METHODS IN ORGANIZATION STUDIES ––––––––––––––––––We then opened up a discussion regard<strong>in</strong>g the atmosphere <strong>in</strong> the organization and whysome departments deemed themselves safer than others.The aim was <strong>to</strong> simulate the empathy and reflective question<strong>in</strong>g found <strong>in</strong> relational<strong>in</strong>terviews, although extra care needs <strong>to</strong> be taken <strong>in</strong> the word<strong>in</strong>g of responses and <strong>in</strong>support<strong>in</strong>g the participants’ ideas. In particular it is important <strong>to</strong> thank the participant forrespond<strong>in</strong>g, offer feedback such as summariz<strong>in</strong>g <strong>to</strong> show you understand, and show explicitsupport for their ideas. At the same time, it is helpful <strong>to</strong> adapt your language style <strong>to</strong> that ofthe participant and ma<strong>in</strong>ta<strong>in</strong> a friendly <strong>to</strong>ne. Mann and Stewart (2000) found that participantsneeded additional encouragement and positive feedback us<strong>in</strong>g e-mail.Tim<strong>in</strong>g has also been shown <strong>to</strong> be important <strong>in</strong> this form of communication. A speedyresponse <strong>in</strong>dicates a positive attitude (Walther and Tidwell, 1995), suggest<strong>in</strong>g the <strong>research</strong>ershould check regularly and reply quickly. At the same time a delay from the participant (whichmay be frustrat<strong>in</strong>g <strong>to</strong> the <strong>research</strong>er) should not be taken as a bad sign, as they may be busyor, <strong>in</strong>deed, tak<strong>in</strong>g time <strong>to</strong> reflect.SECURITYComputer viruses are an <strong>in</strong>creas<strong>in</strong>g problem, and some people are unwill<strong>in</strong>g <strong>to</strong> open e-mailsfrom strangers. We had hoped <strong>to</strong> reduce this problem, and conform with ethical <strong>guide</strong>l<strong>in</strong>es,by request<strong>in</strong>g that the HR department send an <strong>in</strong>troduc<strong>to</strong>ry e-mail <strong>to</strong> all staff. Howeverproblems still arose because the central ‘firewall’ (part of the ma<strong>in</strong> computer system thatcontrols access <strong>to</strong> and from other computers, <strong>in</strong> particular e-mail and <strong>in</strong>ternet access) had beenset <strong>to</strong> high security due <strong>to</strong> a new virus, and was bounc<strong>in</strong>g even standard e-mails. This isunusual, but must be taken <strong>in</strong><strong>to</strong> consideration when discuss<strong>in</strong>g access via this method.ETHICS OF E-MAIL RESEARCHE-mails can be <strong>in</strong>tercepted, and if s<strong>to</strong>red on the company ma<strong>in</strong>frame, accessed by certa<strong>in</strong>privileged staff. Regulations regard<strong>in</strong>g e-mail moni<strong>to</strong>r<strong>in</strong>g at work are confus<strong>in</strong>g and still underreview (Crichard, 2001), but many companies do moni<strong>to</strong>r e-mails, partly for their ownprotection. We were concerned that staff might feel they had <strong>to</strong> reply, would not reply for fearof ‘eavesdropp<strong>in</strong>g’ and/or that they would only say positive th<strong>in</strong>gs <strong>in</strong> case these e-mails wereread by others. We <strong>to</strong>ok extra care <strong>to</strong> ensure they knew confidentiality and anonymity wereimportant considerations for us. To help with this we e-mailed the staff from a homecomputer (giv<strong>in</strong>g them a personal air, and the knowledge that there was no ‘big brother’ a<strong>to</strong>ur end check<strong>in</strong>g the contents).MAINTAINING INTERESTThis is a particularly difficult aspect of electronic <strong>in</strong>terviews. In our case it was not thoughtthrough clearly <strong>in</strong> advance how we were go<strong>in</strong>g <strong>to</strong> keep people communicat<strong>in</strong>g, and as notedabove, many dropped out after the first set of questions. There is very little <strong>to</strong> s<strong>to</strong>p peoplesimply not reply<strong>in</strong>g, or forgett<strong>in</strong>g <strong>to</strong> reply, except for a rem<strong>in</strong>der e-mail or us<strong>in</strong>g other modesof communication. Mann and Stewart (2000) outl<strong>in</strong>e some methods for keep<strong>in</strong>g participants<strong>in</strong>volved, but much will depend on the <strong>research</strong> question and whether it is <strong>in</strong>terest<strong>in</strong>g <strong>to</strong> theparticipants, as well as the <strong>research</strong>er’s skill <strong>in</strong> <strong>in</strong>volv<strong>in</strong>g participants <strong>in</strong> the <strong>research</strong>.It may sometimes be useful <strong>to</strong> supplement the e-mail contact with other methods, <strong>to</strong>ma<strong>in</strong>ta<strong>in</strong> <strong>in</strong>terest and <strong>to</strong> aid disclosure. The richest <strong>in</strong>formation that we received on an <strong>in</strong>itiale-mail was from a participant with whom we had first spoken on the telephone. It has been

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!