SlideShare a Scribd company logo
1 of 18
SENSITIVE EDUCATIONAL
RESEARCH
© LOUIS COHEN, LAWRENCE
MANION & KEITH MORRISON
STRUCTURE OF THE CHAPTER
• What is sensitive research?
• Sampling and access
• Ethical issues in sensitive research
• Researching powerful people
• Researching powerless and vulnerable people
• Asking questions
THE IMPORTANCE OF SENSITIVITY
• The researcher has to be sensitive to the
context, the cultures, the participants, the
consequences of the research on a range of
parties, the powerless, the powerful, and
people’s agendas.
WHAT MAKES RESEARCH SENSITIVE?
• Consequences for the participants and others;
• Contents, e.g. taboo, negative or emotionally
charged areas;
• Situational and contextual circumstances;
• Intrusion into private, intimate spheres and deep
personal experience;
• Potential sanction, risk or threat of stigmatization,
incrimination, costs or career loss to the
researcher, participants or others, e.g. groups
and communities;
• Impingement on political alignments;
WHAT MAKES RESEARCH SENSITIVE?
• Penetration of personal defences;
• Cultural and cross-cultural factors and inhibitions;
• Fear of scrutiny and exposure;
• Threat to the researcher and to the family
members and associates of those studied;
• Methodologies and conduct, e.g. when junior
researchers conduct research on powerful
people, when men interview women, when senior
people are involved, where access and
disclosure are difficult.
THREE AREAS OF SENSITIVE
RESEARCH (Lee, 1993)
• Intrusive threat (probing into areas which are
‘private, stressful or sacred’);
• Studies of deviance and social control, i.e. which
could reveal information that could stigmatize or
incriminate;
• Political alignments (e.g. of rich, powerful and
famous).
SAMPLING AND ACCESS
• It may be difficult to assess the size of the
population from which the sample is to be
drawn, as members of particular groups may not
want to disclose their associations or expose
themselves to public scrutiny.
• People may not wish to reveal their membership
of groups or their own activities, as these may
be illicit, critical of others, unpopular, threatening
to their own professional security, deviant and
less frequent than other activities.
SAMPLING AND ACCESS
• Access may be a major obstacle.
• How do researchers gain access to truants,
teenage mothers, bullies and victims, drug
users, solvent abusers in school students, or
alcohol and medication use in teachers, or
family relationship problems brought about by
the stresses of teaching?
• Gatekeepers have a powerful function, in
controlling, blocking or gaining access; what to
offer gatekeepers, or how to go round them?
GAINING ACCESS INVOLVES . . .
• Gaining access to schools and teachers;
• Gaining permission to conduct the research;
• People vetting which data can be used;
• Finding enough willing participants for the
sample;
• Schools/institutions/people not wishing to divulge
information about themselves;
• Schools’ fear of criticism/loss of face or
reputation;
• Schools/institutions not wishing to be identifiable,
even with protections guaranteed;
• Local political factors that impinge on the
school/educational institution;
GAINING ACCESS INVOLVES . . .
• Teachers’/participants’ fear of being identified/
traceable, even with protections guaranteed;
• Fear of participation by teachers (e.g. if they say critical
matters about the school or others they could lose their
contracts);
• Unwillingness of teachers to be involved because of
their workload;
• The headteacher/principal deciding on whether to
involve the staff, without consultation with the staff;
• The sensitivity of the research – the issues being
investigated;
• The power/position of the researcher (e.g. whether the
researcher is a junior or senior figure in education).
SAMPLING STRATEGIES IN
SENSITIVE RESEARCH (Lee, 1993)
• List sampling (looking through public domain
lists of e.g. recent divorces)
• Multi-purposing (using an existing survey to
reach populations of interest)
• Screening (targeting a particular location and
canvassing within it)
• Outcropping (going to a particular location
where known members of the target group
congregate or can be found, e.g. a school
staffroom)
SAMPLING STRATEGIES IN
SENSITIVE RESEARCH (Lee, 1993)
• Servicing (offering some sort of service in return
for participation)
• Professional informants (e.g. police, doctors,
priests, social workers, medics, teachers,
counsellors)
• Advertising (to reach a wide population)
• Networking (snowball sampling)
ETHICAL ISSUES IN SENSITIVE RESEARCH
• ‘Guilty knowledge’ and ‘dirty hands’.
• Protection of individuals versus the public’s right to
know.
• Covert or overt research, deception and betrayal.
• Breaching informed consent.
• Whose interests is the researcher serving?
• Whose side is she/he on?
• Are participants safe? Are guarantees of
confidentiality and non-traceability real or possible?
• What if it is not possible to conceal identities?
• What if the research yields negative findings?
• What to do with useful ‘off the record’ data?
RESEARCHING POWERFUL PEOPLE
• How to gain and sustain access;
• How much are the participants might disclose/withhold;
• What is on and off the record;
• How to prepare for interviews with powerful people;
• How to probe and challenge powerful people;
• How, and whether to gain informed consent;
• How to balance the interviewer’s and interviewees’
agendas;
• The status of the researcher vis-à-vis the participants;
• Who should conduct interviews with powerful people;
• How neutral/accepting to be with participants;
• Whether to identify the participants in the reporting;
• How to balance the public’s right to know and the
individual’s right to privacy; what is in the public interest.
RESEARCHING THE POWERLESS AND
VULNERABLE
• How to gain and sustain access;
• How much are the participants likely to disclose or
withhold;
• What is on and off the record;
• Where the interviews/data collection will take place;
• How to probe powerless and vulnerable people;
• How to ensure non-maleficence and beneficence,
dignity and respect;
• How to avoid further stigmatization, negative
stereotyping, and marginalization;
• How to act in the interests of the participants;
• How, and whether to gain informed consent;
RESEARCHING THE POWERLESS AND
VULNERABLE
• Overt or covert research, with or without deceit;
• How to conduct interviews that balance the interviewer’s
and interviewees’ agendas;
• How to equalize status between the researcher and the
participants;
• How to ensure inclusiveness of participants;
• Who should conduct interviews with powerless and
vulnerable people;
• What protections are there for the participants;
• Whether to identify the participants in the reporting;
• How to balance the public’s right to know and the
individual’s right to privacy; what is in the public interest.
ASKING QUESTIONS
• As a general rule, the more sensitive is the
research, the more important it is to conduct
face-to-face interviews for data collection.
• Open questions may be preferable to closed
questions.
• Longer questions may be preferable to shorter
questions.
• Enable respondents to answer in their own
words.
• Use familiar words.
• Use real-life examples.
• Plan how to handle emotive topics.
ASKING QUESTIONS
• Consider: the characteristics of the researcher
(e.g. sex, ethnicity, race, age, status, clothing,
appearance, rapport, background, expertise,
institutional affiliation, political affiliation, type of
employment or vocation).
• Females may feel more comfortable being
interviewed by a female;
• Males may feel uncomfortable being interviewed
by a female;
• Powerful people may feel insulted by being
interviewed by a novice research assistant.
• Anticipate difficulties in the interview
and plan how to overcome them.

More Related Content

Viewers also liked

Diploma engg iv u-1.2 infinitive
Diploma engg iv u-1.2 infinitiveDiploma engg iv u-1.2 infinitive
Diploma engg iv u-1.2 infinitive
Rai University
 

Viewers also liked (20)

Chapter25
Chapter25Chapter25
Chapter25
 
Ponencia%20 Ungs%20 Fam%20 Final[2]
Ponencia%20 Ungs%20 Fam%20 Final[2]Ponencia%20 Ungs%20 Fam%20 Final[2]
Ponencia%20 Ungs%20 Fam%20 Final[2]
 
B.tech iv u-1.3 question tag
B.tech iv u-1.3 question tagB.tech iv u-1.3 question tag
B.tech iv u-1.3 question tag
 
Diploma ii cfpc u-4 function, storage class and array and strings
Diploma ii  cfpc u-4 function, storage class and array and stringsDiploma ii  cfpc u-4 function, storage class and array and strings
Diploma ii cfpc u-4 function, storage class and array and strings
 
Diploma engg iv u-1.2 infinitive
Diploma engg iv u-1.2 infinitiveDiploma engg iv u-1.2 infinitive
Diploma engg iv u-1.2 infinitive
 
Building rich apps with HTML5 and friends
Building rich apps with HTML5 and friendsBuilding rich apps with HTML5 and friends
Building rich apps with HTML5 and friends
 
Diploma engg iv u-1.3 simple, compound & complex sentences
Diploma engg iv u-1.3 simple, compound & complex sentencesDiploma engg iv u-1.3 simple, compound & complex sentences
Diploma engg iv u-1.3 simple, compound & complex sentences
 
Chapter1
Chapter1Chapter1
Chapter1
 
Chapter3
Chapter3Chapter3
Chapter3
 
Bsc cs ii dfs u-4 sorting and searching structure
Bsc cs ii dfs u-4 sorting and searching structureBsc cs ii dfs u-4 sorting and searching structure
Bsc cs ii dfs u-4 sorting and searching structure
 
B.sc ii unit 2 writing skill
B.sc ii unit 2 writing skillB.sc ii unit 2 writing skill
B.sc ii unit 2 writing skill
 
Diploma engg iv u-1.3 change of degrees
Diploma engg iv u-1.3 change of degreesDiploma engg iv u-1.3 change of degrees
Diploma engg iv u-1.3 change of degrees
 
Encuentralo con Google
Encuentralo con GoogleEncuentralo con Google
Encuentralo con Google
 
Chapter29
Chapter29Chapter29
Chapter29
 
B.sc i micro bio u 3introduction to multimedia
B.sc i micro bio u 3introduction to multimediaB.sc i micro bio u 3introduction to multimedia
B.sc i micro bio u 3introduction to multimedia
 
B.sc ii unit iii homophones
B.sc ii unit iii homophonesB.sc ii unit iii homophones
B.sc ii unit iii homophones
 
Chapter30
Chapter30Chapter30
Chapter30
 
B.sc ii unit i verbs
B.sc ii unit i verbsB.sc ii unit i verbs
B.sc ii unit i verbs
 
BBA 2 Unit 1-verb
BBA 2 Unit 1-verbBBA 2 Unit 1-verb
BBA 2 Unit 1-verb
 
Bjmc i, dcm, unit-iii, rise of internet journalism
Bjmc i, dcm, unit-iii, rise of internet journalismBjmc i, dcm, unit-iii, rise of internet journalism
Bjmc i, dcm, unit-iii, rise of internet journalism
 

Similar to Chapter9

IFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptxIFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptx
EyalClyne
 
Week 3 – 91417Today• 2nd Research Example• Q.docx
Week 3 – 91417Today• 2nd Research Example• Q.docxWeek 3 – 91417Today• 2nd Research Example• Q.docx
Week 3 – 91417Today• 2nd Research Example• Q.docx
cockekeshia
 
Building Ethics into the Research with Vulnerable groups
Building Ethics into the Research with Vulnerable groups Building Ethics into the Research with Vulnerable groups
Building Ethics into the Research with Vulnerable groups
la71
 
Lecture 7-research ethics and engaging culture.pptx
Lecture 7-research ethics and engaging culture.pptxLecture 7-research ethics and engaging culture.pptx
Lecture 7-research ethics and engaging culture.pptx
XiaolanDeng1
 
Common Ethical Issues in Research.pptx
Common Ethical Issues in Research.pptxCommon Ethical Issues in Research.pptx
Common Ethical Issues in Research.pptx
JhalakVerma7
 
Building Ethics into the Research with Vulnerable Groups
Building Ethics into the Research with Vulnerable Groups Building Ethics into the Research with Vulnerable Groups
Building Ethics into the Research with Vulnerable Groups
la71
 

Similar to Chapter9 (20)

Chapter5
Chapter5Chapter5
Chapter5
 
IFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptxIFY_SSc_Lecture4_Ethics.pptx
IFY_SSc_Lecture4_Ethics.pptx
 
GROUP 6-1.pptx
GROUP 6-1.pptxGROUP 6-1.pptx
GROUP 6-1.pptx
 
RMD 100Q Chapter5 cohen ak revised ethics
RMD 100Q Chapter5 cohen ak revised   ethicsRMD 100Q Chapter5 cohen ak revised   ethics
RMD 100Q Chapter5 cohen ak revised ethics
 
Week 3 – 91417Today• 2nd Research Example• Q.docx
Week 3 – 91417Today• 2nd Research Example• Q.docxWeek 3 – 91417Today• 2nd Research Example• Q.docx
Week 3 – 91417Today• 2nd Research Example• Q.docx
 
Sociology as revision
Sociology as revisionSociology as revision
Sociology as revision
 
Risks and research ethics
Risks and research ethicsRisks and research ethics
Risks and research ethics
 
Research ethics
Research ethicsResearch ethics
Research ethics
 
Building Ethics into the Research with Vulnerable groups
Building Ethics into the Research with Vulnerable groups Building Ethics into the Research with Vulnerable groups
Building Ethics into the Research with Vulnerable groups
 
Lecture 7-research ethics and engaging culture.pptx
Lecture 7-research ethics and engaging culture.pptxLecture 7-research ethics and engaging culture.pptx
Lecture 7-research ethics and engaging culture.pptx
 
role of ethics in research.pptx
role of ethics in research.pptxrole of ethics in research.pptx
role of ethics in research.pptx
 
RESEARCH ETHICS.pptx
RESEARCH ETHICS.pptxRESEARCH ETHICS.pptx
RESEARCH ETHICS.pptx
 
Ethics in research
Ethics in researchEthics in research
Ethics in research
 
Three Cases of Ethical Controversy
Three Cases of Ethical ControversyThree Cases of Ethical Controversy
Three Cases of Ethical Controversy
 
Common Ethical Issues in Research.pptx
Common Ethical Issues in Research.pptxCommon Ethical Issues in Research.pptx
Common Ethical Issues in Research.pptx
 
Ethics and research
Ethics and researchEthics and research
Ethics and research
 
SociologyExchange.co.uk Shared Resource
SociologyExchange.co.uk Shared ResourceSociologyExchange.co.uk Shared Resource
SociologyExchange.co.uk Shared Resource
 
Building Ethics into the Research with Vulnerable Groups
Building Ethics into the Research with Vulnerable Groups Building Ethics into the Research with Vulnerable Groups
Building Ethics into the Research with Vulnerable Groups
 
Ethics of education and social research
Ethics of education and social researchEthics of education and social research
Ethics of education and social research
 
Research methodology
Research methodologyResearch methodology
Research methodology
 

More from Ying Liu

More from Ying Liu (20)

首尔大韩国语语法Topik考试语法合集 刘赢整理
首尔大韩国语语法Topik考试语法合集 刘赢整理首尔大韩国语语法Topik考试语法合集 刘赢整理
首尔大韩国语语法Topik考试语法合集 刘赢整理
 
Chapter38
Chapter38Chapter38
Chapter38
 
Chapter36b
Chapter36bChapter36b
Chapter36b
 
Chapter36a
Chapter36aChapter36a
Chapter36a
 
Chapter35
Chapter35Chapter35
Chapter35
 
Chapter34
Chapter34Chapter34
Chapter34
 
Chapter33
Chapter33Chapter33
Chapter33
 
Chapter32
Chapter32Chapter32
Chapter32
 
Chapter31
Chapter31Chapter31
Chapter31
 
Chapter28
Chapter28Chapter28
Chapter28
 
Chapter27
Chapter27Chapter27
Chapter27
 
Chapter26
Chapter26Chapter26
Chapter26
 
Chapter24
Chapter24Chapter24
Chapter24
 
Chapter23
Chapter23Chapter23
Chapter23
 
Chapter22
Chapter22Chapter22
Chapter22
 
Chapter21
Chapter21Chapter21
Chapter21
 
Chapter20
Chapter20Chapter20
Chapter20
 
Chapter17
Chapter17Chapter17
Chapter17
 
Chapter16
Chapter16Chapter16
Chapter16
 
Chapter15
Chapter15Chapter15
Chapter15
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Chapter9

  • 1. SENSITIVE EDUCATIONAL RESEARCH © LOUIS COHEN, LAWRENCE MANION & KEITH MORRISON
  • 2. STRUCTURE OF THE CHAPTER • What is sensitive research? • Sampling and access • Ethical issues in sensitive research • Researching powerful people • Researching powerless and vulnerable people • Asking questions
  • 3. THE IMPORTANCE OF SENSITIVITY • The researcher has to be sensitive to the context, the cultures, the participants, the consequences of the research on a range of parties, the powerless, the powerful, and people’s agendas.
  • 4. WHAT MAKES RESEARCH SENSITIVE? • Consequences for the participants and others; • Contents, e.g. taboo, negative or emotionally charged areas; • Situational and contextual circumstances; • Intrusion into private, intimate spheres and deep personal experience; • Potential sanction, risk or threat of stigmatization, incrimination, costs or career loss to the researcher, participants or others, e.g. groups and communities; • Impingement on political alignments;
  • 5. WHAT MAKES RESEARCH SENSITIVE? • Penetration of personal defences; • Cultural and cross-cultural factors and inhibitions; • Fear of scrutiny and exposure; • Threat to the researcher and to the family members and associates of those studied; • Methodologies and conduct, e.g. when junior researchers conduct research on powerful people, when men interview women, when senior people are involved, where access and disclosure are difficult.
  • 6. THREE AREAS OF SENSITIVE RESEARCH (Lee, 1993) • Intrusive threat (probing into areas which are ‘private, stressful or sacred’); • Studies of deviance and social control, i.e. which could reveal information that could stigmatize or incriminate; • Political alignments (e.g. of rich, powerful and famous).
  • 7. SAMPLING AND ACCESS • It may be difficult to assess the size of the population from which the sample is to be drawn, as members of particular groups may not want to disclose their associations or expose themselves to public scrutiny. • People may not wish to reveal their membership of groups or their own activities, as these may be illicit, critical of others, unpopular, threatening to their own professional security, deviant and less frequent than other activities.
  • 8. SAMPLING AND ACCESS • Access may be a major obstacle. • How do researchers gain access to truants, teenage mothers, bullies and victims, drug users, solvent abusers in school students, or alcohol and medication use in teachers, or family relationship problems brought about by the stresses of teaching? • Gatekeepers have a powerful function, in controlling, blocking or gaining access; what to offer gatekeepers, or how to go round them?
  • 9. GAINING ACCESS INVOLVES . . . • Gaining access to schools and teachers; • Gaining permission to conduct the research; • People vetting which data can be used; • Finding enough willing participants for the sample; • Schools/institutions/people not wishing to divulge information about themselves; • Schools’ fear of criticism/loss of face or reputation; • Schools/institutions not wishing to be identifiable, even with protections guaranteed; • Local political factors that impinge on the school/educational institution;
  • 10. GAINING ACCESS INVOLVES . . . • Teachers’/participants’ fear of being identified/ traceable, even with protections guaranteed; • Fear of participation by teachers (e.g. if they say critical matters about the school or others they could lose their contracts); • Unwillingness of teachers to be involved because of their workload; • The headteacher/principal deciding on whether to involve the staff, without consultation with the staff; • The sensitivity of the research – the issues being investigated; • The power/position of the researcher (e.g. whether the researcher is a junior or senior figure in education).
  • 11. SAMPLING STRATEGIES IN SENSITIVE RESEARCH (Lee, 1993) • List sampling (looking through public domain lists of e.g. recent divorces) • Multi-purposing (using an existing survey to reach populations of interest) • Screening (targeting a particular location and canvassing within it) • Outcropping (going to a particular location where known members of the target group congregate or can be found, e.g. a school staffroom)
  • 12. SAMPLING STRATEGIES IN SENSITIVE RESEARCH (Lee, 1993) • Servicing (offering some sort of service in return for participation) • Professional informants (e.g. police, doctors, priests, social workers, medics, teachers, counsellors) • Advertising (to reach a wide population) • Networking (snowball sampling)
  • 13. ETHICAL ISSUES IN SENSITIVE RESEARCH • ‘Guilty knowledge’ and ‘dirty hands’. • Protection of individuals versus the public’s right to know. • Covert or overt research, deception and betrayal. • Breaching informed consent. • Whose interests is the researcher serving? • Whose side is she/he on? • Are participants safe? Are guarantees of confidentiality and non-traceability real or possible? • What if it is not possible to conceal identities? • What if the research yields negative findings? • What to do with useful ‘off the record’ data?
  • 14. RESEARCHING POWERFUL PEOPLE • How to gain and sustain access; • How much are the participants might disclose/withhold; • What is on and off the record; • How to prepare for interviews with powerful people; • How to probe and challenge powerful people; • How, and whether to gain informed consent; • How to balance the interviewer’s and interviewees’ agendas; • The status of the researcher vis-à-vis the participants; • Who should conduct interviews with powerful people; • How neutral/accepting to be with participants; • Whether to identify the participants in the reporting; • How to balance the public’s right to know and the individual’s right to privacy; what is in the public interest.
  • 15. RESEARCHING THE POWERLESS AND VULNERABLE • How to gain and sustain access; • How much are the participants likely to disclose or withhold; • What is on and off the record; • Where the interviews/data collection will take place; • How to probe powerless and vulnerable people; • How to ensure non-maleficence and beneficence, dignity and respect; • How to avoid further stigmatization, negative stereotyping, and marginalization; • How to act in the interests of the participants; • How, and whether to gain informed consent;
  • 16. RESEARCHING THE POWERLESS AND VULNERABLE • Overt or covert research, with or without deceit; • How to conduct interviews that balance the interviewer’s and interviewees’ agendas; • How to equalize status between the researcher and the participants; • How to ensure inclusiveness of participants; • Who should conduct interviews with powerless and vulnerable people; • What protections are there for the participants; • Whether to identify the participants in the reporting; • How to balance the public’s right to know and the individual’s right to privacy; what is in the public interest.
  • 17. ASKING QUESTIONS • As a general rule, the more sensitive is the research, the more important it is to conduct face-to-face interviews for data collection. • Open questions may be preferable to closed questions. • Longer questions may be preferable to shorter questions. • Enable respondents to answer in their own words. • Use familiar words. • Use real-life examples. • Plan how to handle emotive topics.
  • 18. ASKING QUESTIONS • Consider: the characteristics of the researcher (e.g. sex, ethnicity, race, age, status, clothing, appearance, rapport, background, expertise, institutional affiliation, political affiliation, type of employment or vocation). • Females may feel more comfortable being interviewed by a female; • Males may feel uncomfortable being interviewed by a female; • Powerful people may feel insulted by being interviewed by a novice research assistant. • Anticipate difficulties in the interview and plan how to overcome them.