19.12.2022 Views

Creswell_Research_Design_ Qualitative Quantitative and Mixed Methods Approaches 2018 5th Ed

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

showing how the data will not be compromised and how such information will not place the participants (or

the researchers) at risk. In addition, multiple strategies for validation (see approaches to validation later in this

chapter) are necessary to demonstrate the accuracy of the information.

Further, indicate steps taken to obtain permission from the institutional review board (IRB) (see Chapter 4)

to protect the rights of human participants. Attach, as an appendix, the approval letter from the IRB and

discuss the process involved in securing permissions. Discuss steps taken to gain entry to the setting and to

secure permissions to study the participants or situation (Marshall & Rossman, 2016). It is important to gain

access to research or archival sites by seeking the approval of gatekeepers, individuals at the site who provide

access to the site and allow or permit the research to be done. A brief proposal might need to be developed

and submitted for review to gatekeepers. Bogdan and Biklen (1992) advanced topics that could be addressed

in such a proposal:

Why was the site chosen for study?

What activities will occur at the site during the research study?

Will the study be disruptive?

How will the results be reported?

What will the gatekeeper gain from the study?

Comment about sensitive ethical issues that may arise (see Chapter 4). For each issue raised, discuss how the

research study will address it. For example, when studying a sensitive topic, it is necessary to mask names of

people, places, and activities. In this situation, the process for masking information requires discussion in the

proposal.

261

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!