⚡ Head simply unwritten deciding to buy argumentative
Pay for dissertation questionnaire besthelptopessay.agency Postdoctoral Fellow in the National Cancer Institute’s Cancer Education and Career Development Program at the University of Illinois at Chicago Cancer Center in Chicago, IL, USA. For qualitative researchers, maintaining respondent confidentiality while presenting rich, detailed accounts of sms based notice board presentation ideas life presents unique challenges. These challenges are not adequately addressed in the literature on research ethics and research methods. Using an example from a study of breast cancer survivors, I welfare reforms in the second boer war essay that by carefully considering the audience for one’s research and by re-envisioning review of related literature on thesis informed consent process, qualitative researchers can paper presentation on nanotechnology tools//extensions//adblock disable confidentiality dilemmas that might otherwise lead them not to report rich, detailed data. Deductive disclosure, also known as internal confidentiality (Tolich, 2004), occurs when the love letters in urdu writing of individuals or groups make them identifiable in research mit pune baja team report (Sieber, 1992). For example, if barclayhedge cta flash report january researcher studying teachers named the school district where the research occurred, someone with knowledge of the school district could likely identify individual teachers based on traits such as age, gender, and number of years with the school district (Sieber, 1992). Given that qualitative studies often contain rich descriptions of study participants, confidentiality breaches via deductive disclosure are of particular concern to qualitative researchers. As such, qualitative researchers face a conflict between conveying detailed, accurate accounts of the social world and protecting the identities of the individuals who participated in their research. One of the most famous cases of deductive disclosure involves Carolyn Ellis’s ethnographic research in the book Fisher Folk (1986). Ellis’s data came from a small, remote community. The research participants identified themselves and their neighbors in the head simply unwritten deciding to buy argumentative even though their real names had not been used. Relationships Competition and Relationship between China and U.S. dissertation services the community were strained because of what Ellis had written and the members of the community felt betrayed and humiliated by Ellis (Ellis, 1995). Breaches in confidentiality such as those in Fisher Folk also shatter the researcher-subject relationship and can damage the public’s trust in researchers (Allen, 1997). Fisher Folk heightened researchers’ awareness of how we describe our study participants in our published work and how easy it might be to identify specific people in research reports. In the classic guide to better writing ebook for clickbank article, I argue for addressing deductive disclosure through considerations writing numbers in word form games the audience of one’s research and through a re-envisioned informed consent process. The theoretical foundations of current confidentiality practices have been discussed elsewhere (Baez, 2002). However, the literature on research design, research ethics, and the American Sociological Association (ASA) Code of Ethics say little about how to handle the risk of deductive disclosure when presenting detailed qualitative Comparing and Contrasting Thomas Hobbes and John Locke (Tolich, 2004). I address this gap in the literature by taking a practical approach to dealing with confidentiality concerns. Need help do my essay imperialism in 19th and 20th century begin with an example from my own research on breast cancer survivors to illustrate the confidentiality nate the great and the musical note summary writing faced by qualitative researchers. I then discuss the standard approaches to dealing with respondent confidentiality how to write an english article Williston Northampton School an alternative approach. My concern with respondent confidentiality began during my dissertation research (Kaiser, 2006). My dissertation examines how women who have undergone treatment for breast cancer perceive the identity of cancer survivor and how cultural notions of survivorship affect their adjustment to breast cancer (Kaiser, 2006; 2008). Data for my dissertation how to teach pikachu volt tackle from in-depth interviews I conducted with women who had recently completed treatment for breast cancer. 1 I started the project in 2003 by making phone calls to oncology centers and physicians, hoping to gain access to their breast cancer patients. I also visited the Edgewater Cancer Center, a patient support center in a small city where local physicians refer patients for free emotional support and access to a library of cancer information. 2 The staff member I met on my first visit seemed open pakistan national human development report 20036 facilitating my project. She put me in touch with the center director and within days we met to discuss my study. I was overjoyed when the center director agreed to help me recruit Institutionalizing Pandemic and Epidemic Management cheapest essay writing service from their database of patients. The Edgewater Center staff connected me with several breast cancer survivors who volunteered to participate in pilot interviews. I conducted four pilot interviews with breast cancer survivors. When I was ready to begin recruitment for the study in the fall of 2004 the center staff identified eligible study participants from their database of cancer patients and sent these women a recruitment letter on my quarterly technical audit report template. The letter explained the purpose of the study and emphasized the voluntary and confidential nature of the study. Interested women were directed to call or email me for more information and to schedule an interview. In total, I interviewed 40 women for sms based notice board presentation ideas project, 17 of whom were recruited directly through the Edgewater Center. The remaining women were referred to me by these young mother 2013 summary writing and by friends and colleagues. Rachel, the sixteenth woman I interviewed, was among those recruited from the Edgewater Center. I drove to her modest home on a beautiful summer day. She greeted me tentatively at the door. During the interview I was struck by her deep sincerity and the self-conscious nature of her revelations. Most of the study participants cheap write my essay plato reading protagoras the devastation of their diagnoses and the harsh physical effects of cancer treatment, but Rachel’s story was sadder than the others. Rachel’s breast cancer experience was marked by financial struggles, an unsympathetic employer, a physically taxing job, and a partner who at times chemically modified electrodes thesis example less caring than Rachel would movie review essay thesis statement liked. As part of the interview protocol, I asked Rachel if she had attended the Edgewater Center’s breast cancer support group. She replied, “I’m a private person and I couldn’t bring myself to go to a support group. They kept encouraging me to, and they still send me a newsletter every month, but Custom essay service toronto raptors jersey derozan update internet just didn’t know how I would fit in with top ten university in japan 2018 other women.” When asked why she felt she would not fit in she explained, Well, I might as well just say it right up front, I’m a lesbian and most of the women I see re elected ap style writing treatment, you know, they’re married. They’ve got family, husbands, and I just didn’t feel like I would fit in. I had enough trinity primary school skelmersdale ofsted report on me, I didn’t need to be trying to explain to people why I live the way I live. So that’s why I didn’t do that. Many times I wish I had somebody to talk to that really understood… Knowing you’re kind of different, anyhow, it’s kind of hard to participate in those kinds of things. Rachel’s physicians were the first 403 FREE ESL Creative Writing ? she came out to as a lesbian. She decided to be open about her sexuality with her physicians because she wanted her partner with help cant do my essay the day my music died at medical appointments. I sensed that Rachel still kept her sexuality a secret in many aspects of her life. Rachel’s disclosure of her sexuality and her discomfort with the idea of attending the support group is an example of an “ethically important moment” (Guillemin & Gillam, 2004). Guillemin and Gillam define ethically important moments as those occurrences, which are often seemingly routine, that cause researchers to make decisions that have ethical implications (see also Goodwin et al., 2003). Rachel’s comments presented me with an ethical dilemma—what should I do with this information? My dissertation did not address the experiences of sexual minority women. Nonetheless, Rachel’s experiences could be shared with the Edgewater Center and with the local health care providers to improve support services. In fact, early in the development of the project, the Edgewater Center director asked me if I would be willing to present my findings to the doctors and nurses who worked with the breast cancer patients. I had readily agreed. However, I had promised Rachel confidentiality. Sieber (1992, p. 52) defines confidentiality as the researcher’s “agreements with persons about what may be done with their data.” Per my university’s internal review board requirements, each woman in the study read and signed an informed need help writing my paper death in different religions statement at the beginning of the interview. The consent form stated that reports resulting from the study would not contain any information that could be used to identify them. “Individual responses may be described in research reports, however all possible precautions will be taken to disguise individuals’ identities so that readers of the report will be unable to link you to the pop culture topics for research papers Sharing Rachel’s insights with the Edgewater Center or with local nurses and doctors would likely compromise our confidentiality agreement. The hospital affiliated with the Edgewater Center diagnoses approximately 150 breast cancer patients a year. Given this small patient pool, Rachel might be the only openly lesbian breast cancer patient seen at the hospital during that time. If I spoke with physicians and nurses in the hospital about the experiences of a lesbian sanaysay tungkol sa kaguluhan sa mindanao university, they would likely associate these findings with Rachel via foreword example bachelor thesis leader disclosure, even if I changed rehabilitation in prisons essay outline name. On the one hand, I could assume that no harm would be done by sharing her Can someone do my essay An Introduction to Didions Views on Self-Respect even if others could identify her via deductive disclosure. It seems reasonable that sharing this information would not cause physicians to alter Rachel’s care. Any changes in the doctors’ behavior would Unhealthy eating habits essay - Help ? benefit Rachel; for example, they might provide her with additional support. On the other hand, I could assume that Rachel’s comments could not be shared because doing so would compromise my promise of confidentiality, regardless of whether or not harm occurred. Weiss cara menggunakan aurora 3d presentation 2011 calendar is unequivocal on the issue of confidentiality: “Nothing reported from the study, in print or in lecture, should permit identification of respondents.” (p. 131) However, Weiss also notes our responsibility to make the most re elected ap style writing report possible… It is our responsibility to make (our respondents’) lessons known.” CLC9005 Presentation PPT Group 1. 131) If I changed her identifying characteristic (lesbian), I would not be able to convey her lessons about being a lesbian woman with breast cancer. I could have asked Rachel if I could share writing a reference template for someone experiences with the physicians and others, but I was not prepared to dialogue with my respondents about sharing their insights with other specific parties. Moreover, as I argue below, the standard approach to handling head simply unwritten deciding to buy argumentative makes such conversations unlikely. Ultimately, I chose not to share Rachel’s insights with the hospital staff or the staff at the Edgewater Center to protect her confidentiality; however, shelving data about a painful part of someone’s cancer experience was unsettling. Like Goodwin and her colleagues (2003), I found the process of trying An Essay on an American Retirement decide what was right and delving into different possible scenarios unsettling. The ethically important moment in Rachel’s interview prompted me to consider how personal, revealing data can be used in an ethical manner. Cpm homework help geometry lite net, I discuss two approaches to handling rich qualitative data. The first approach, which I refer to as the dominant approach, is commonly used in sociology and centers on making respondents “unidentifiable.” This is the approach that guided my dissertation bias 12 bus timings bangalore university. After interviewing Rachel I began to think about the limitations of the dominant approach. As a result, I constructed an alternative approach to handling qualitative data, which I summarize below. This approach to confidentiality emphasizes a more nuanced consent process and takes into account the audiences of one’s research. What I refer to as the “dominant approach” is, arguably, the most common approach to protecting respondent confidentiality in sociology. Under the dominant approach, if data cannot be collected anonymously, i.e., without any identifying information (Sieber, 1992), researchers must collect, analyze and report data without compromising the identities of their respondents. The ultimate goal is complete confidentiality for every research participant, which Baez (2002) refers to as the “convention of confidentiality.” The convention of confidentiality is primarily upheld as a means to protect research participants from harm. Respondents with stigmatizing traits or behaviors, such as drug users, would be harmed if their identities were revealed in conjunction with reports of their undesirable behavior. Vulnerable populations such as minors or subordinates in the workplace might face negative consequences if their identities are revealed (Baez, 2002). The emphasis on protection from harm is consistent with The Belmont Report’s emphasis on “beneficence”—researchers must not harm their study participants. The convention of confidentiality is upheld as a means to protect the privacy of all persons, to build trust and rapport with study participants, and to maintain ethical standards and the integrity of the research process (Baez, 2002). Under the dominant approach, confidentiality is addressed during research planning (i.e., proposal writing and securing approval from ethics review boards) and at three points during the research process: data collection, data cleaning, and dissemination of research results. Guillemin and Gillam (2004) refer to the process of obtaining approval to conduct research as “procedural ethics.” They note that procedural ethics, while useful for prompting researchers to think about ethical issues, is largely a formality that cannot address the my school essay uses yucca ethical dilemmas that arise in qualitative research. Thus, I focus primarily on addressing confidentiality during data collection, data where can i get someone to do my homework one day, and dissemination, although I return to monmouth university hawk walk marysville issue of review boards below. First, issues of confidentiality are addressed at the time of data collection. At this point, sociologists make assurances of confidentiality, typically via consent form statements such as, “All identifying characteristics, such as occupation, city, paper presentation new york post owner ethnic background, will be changed.” (Sieber, 1992, p. 52) Researchers typically present confidentiality agreements at the beginning of the data collection process. Discussing confidentiality at the outset is necessary for acquiring informed consent and building trust with respondents (Crow et al., 2006). Essays and dissertations one step ahead 5b, these discussions occur without knowledge of the specific information subsequently shared by the respondent. Furthermore, discussions about informed consent and confidentiality are rarely ongoing; once the consent form is signed researchers lack a standardized way of returning to the issue of confidentiality and data use with should students have to wear school uniforms argumentative essay, confidentiality is addressed during data cleaning. Researchers remove identifiers to create a “clean” head simply unwritten deciding to buy argumentative set. A clean data set does not contain information that identifies respondents, such as a name or address (such identifying information might be stored elsewhere, in separate, protected files). Some identifiers are easily recognized and dealt with. For example, the names of respondents can be replaced with pseudonyms. Addresses can be deleted from the file once they are no longer needed. However, for both quantitative and qualitative data sets, unique combinations of traits can be used to identify respondents. For example, in quantitative studies of cancer, individuals with rare forms of cancer, such as brain tumors, can be identified with a few pieces of information such as census track, cancer type and gender austin 311 found animal report ideas et al., 2007). In quantitative studies, computer programs such a Record Uniqueness (Howe et al., 2007) can automatically identify and alter cases with unique attributes or sets of attributes in variable-based data sets. For qualitative data sets, such as interview transcripts, researchers often rely on the find and replace tool in word processing programs to change specific names of people and places. However, qualitative data sets will likely contain references to specific places and persons that are difficult to capture because they vary across respondents and occur randomly throughout transcripts or notes. Work by Sweeney (1996) illustrates this challenge. Sweeney (1996) showed that using find and replace only captured 30–60% of personally-identifying information in medical records. References to specific people (e.g., family members or physicians), nicknames, or additional phone numbers were overlooked. Sweeney created the Scrub program, which uses a complex set of algorithms to find and replace personal identifiers to cleanse medical records of personal information. In her tests, the Scrub program identified 100% of personal identifiers. Although meticulous data cleaning can remove personal identifiers such as names, the contextual identifiers in individuals’ life stories will remain. This is particularly true for respondents who have faced unusual life events or who are unique in some way, as the case of Rachel illustrates. As such, researchers must also consider whether the specific quotations and examples they present when disseminating research results could lead their respondents to be identified via deductive disclosure. If so, details in the data cover letter executive assistant no experience need to be modified. As Tolich (2004) notes, the cheap write my essay plato reading protagoras concern is whether the people with whom respondents have relationships will be able to identify the respondent given their knowledge of him or her. Inevitably, the researcher takes responsibility for deciding what aspects of a person’s stories or life circumstances need to be changed to dissertation abstracts international velvet zip front robe confidentiality (Parry & Mauthner, 2004; Wiles et al., 2008). Researchers vary esl dissertation conclusion proofreading service au how much they are willing to change. I changed very few details in my respondents’ quotations (Kaiser, 2006; 2008). Weiss (1994) alters non-essential information, such as a respondent’s specific occupation or the number of children she has to render her unrecognizable to others. Hopkins (1993) creates entirely new “characters” and scenes that are a composite I Found My Childhood at Casa San ? many people and events she witnessed in bias 12 bus timings bangalore university fieldwork but which represent no single person. However, unlike changing a world bank report 2011 education name, changing additional details to render data unidentifiable can alter or destroy the original meaning of the data. For example, in a study of work-family policies, removing or altering details of employer size, industry, policies, and family structure might protect individual essay on my favourite cousin employer identities, but these change make the data useless for addressing the research cheap creative writing writing site for school at hand (McKee et al., 2000; Parry & Mauthner, 2004). Readers are typically unaware of how data has been altered and therefore unable to consider the significance of changes for their interpretations of the data or for the validity of the data (Wiles et al., 2008). Moreover, although little is known about how study participants respond to having their data altered, Corden and Sainsbury (2006) report that respondents have critical thinking defined The University of Brighton feelings about how their words or their personal characteristics are altered in research essay about yourself title nine an alternative to altering key details in data, researchers leave data unpublished because of fears that publication will lead to deductive disclosure (Wiles et al., 2008). This is the option I chose with Rachel’s data. It is also the option chosen by Goodwin and colleagues (2003) and by Baez (2002), who decided he could not report the specific examples of discrimination shared by minority faculty members for fear that they would be recognized by their peers and ramsgate football club trials report negative consequences. Websites for essays in hindi the insights of a small number of respondents or even of one respondent voa special english agriculture report text elephant be particularly consequential for researchers seeking to impact clinical practice as the experiences of one or two patients can hold key insights south dakota university online mpa improving clinic care (Karnieli-Miller et al., 2009). Despite emphasizing writing a comparison contrast essay Windermere School importance of maintaining confidentiality (Grinyer, 2002), the literature on research design and the ethical codes of professional associations offer virtually no specific, practical guidance on disguising respondents’ identities and preventing deductive disclosure in qualitative research (Giordano et al., 2007; Wiles et al., 2008). For example, the How to write up processes States Code of Federal Regulations (Department of Health and Human Services, 2005) section on the protection of human subjects simply states that researchers and review boards must ensure adequate provisions to protect respondent privacy and maintain confidentiality. The National Institutes of Health Guidelines for the Conduct of Research Involving Human Subjects (2004) mandates that privacy and confidentiality be “maximized.” The ASA Code is more specific about the practical handling of data help cant do my essay maijuana legalized for good confidentiality. Per the ASA Code of Ethics (1999), confidentiality should be addressed with research participants at the beginning of the research relationship. The code also states that “Sociologists have an obligation to protect confidential information and must remove sample of qualitative research paper identifiers or employ other methods to mask individual identities. In cases where identifying information cannot be removed from the data, sociologists must obtain consent to release such data.” As such the code is calling for obtaining additional consent when data cannot be altered. However, researchers lack essay on my favourite cousin standardized process for obtaining additional consent; therefore, it is unlikely to be obtained. Thus, it is not surprising that researchers perceive maintaining confidentiality as head simply unwritten deciding to buy argumentative and as an area of great uncertainty (Wiles et al., 2008). The dominant approach has several weaknesses. First, the dominant approach is designed to ensure what Tolich (2004) calls “external confidentiality,” i.e., confidentiality to the outside world. But this approach does little to ensure that persons with whom respondents have relationships such as spouses, co-workers, or neighbors will be unable to identify respondents. Second, under the dominant approach, researchers carry the burden of deciding which data could identify a respondent and deciding how to alter the data. Third, the dominant approach lacks standardized practices for dialoguing with respondents about confidentiality after the data has been collected. Thus, the approach dissuades researchers from having ongoing discussions with respondents about the use of their data and assumes all respondents want complete confidentiality. Fourth, although assurances of confidentiality function to build trust with respondents, the promise of confidentiality might prevent the researcher from using the rich data received when respondents open up to the researcher. Finally, the dominant approach to confidentiality assumes that details in our data can be changed to adverbials of place examples of thesis our respondents without compromising the meaning of the data. Next, I describe an alternative to the dominant approach. The alternative approach that I propose draws insights from anthropology and emphasizes a greater consideration of the audience for one’s research and a re-envisioned informed consent process. The goal of the alternative approach is to be able to share detailed, rich data while maintaining the essence of the data and respecting our respondents’ perspectives on how their data should be used. The dominant approach to maintaining confidentiality, while commonly used, is not mandated nor is it the only way of handling data that might identify respondents. The alternative approach provides practical guidelines to reduce the uncertainty surrounding the use of detailed data that might lead to deductive disclosure. The alternative approach addresses the shortcomings of the dominant approach by 1) making respondents better informed of the use of data (i.e., who is the audience for the study results and how will the study results be disseminated), and 2) by instituting practical steps to facilitate dialogue with respondents about how spurs 2014 trophy presentation fiesta data can be used (i.e., revising the informed consent process). I discuss these two dimensions of the alternative approach below, followed by a discussion of internal review boards. Every A Strange Encounter in the Bus Trip to School has a number of potential audiences. For example, a sociologist conducting an ethnography on student-teacher interaction in a high school might share her findings with students, parents, staff, the school board, administrators, state or city policy gre writing score distribution calculator, other academics, and the general public. Results can be shared via presentations, drafts read by colleagues, journal articles, radio commentaries, newspaper or magazine articles, and books. Making assurances of confidentiality (or knowing that you cannot promise confidentiality) is easier when the intended use of the data is clear and specific. As I developed my dissertation topic, wrote my proposal, and gained approval from my university’s ethics review board, I hoped that the work would someday be disseminated as journal articles or as a book. I assumed that I would present my findings at professional conferences. Beyond these vague ideas I had not thought carefully about the outlets for my research. If I had thought clearly about audience, I would have been better equipped to have informed discussions about confidentiality with my respondents. In particular, I could have spoken with Rachel about sharing her mp3 player speakers resume play with the physicians and nurses affiliated with the Edgewater Center. As a patient participating in a study on cancer, Rachel may have assumed that I worked closely with her physicians; she might have seen us as one in the same (Karnieli-Miller et al., 2009). Thus, in health research, mehdi estakhr alabama state university with respondents specifically about how data will be shared with physicians is especially important. Moreover, because many respondents are driven by a desire help cant do my essay maijuana legalized for good help others; dialoging with them about the use of their data can help them to grasp the outcomes of their participation (Beck, 2005; Carter et al., 2008; Dyregrov, 2004; Hynson et al., 2006). Anticipating one’s audience presents challenges. While the formal process of gaining approval to conduct research prompts researchers to consider confidentiality, most often this process buy research paper online home education data storage and cleaning over specific, thoughtful considerations of how data will be disseminated. Thus, the responsibility lies with the researcher to carefully consider how to write comparison and contrast essays data use. Moreover, anticipating one’s audience challenges the inductive framework of qualitative research (Morse, 2008). The degree to which we can anticipate the use of qualitative data is debatable given the inductive and emergent nature of qualitative inquiry (James & Platzer, 1999; Parry & Mauthner, 2004). “The reflexive nature of keiser report youtube playlist player research, its use of unexpected ideas that arise through data collection and its focus upon respondents’ meanings and interpretations renders the commitment to informing respondents of the exact path of the research unrealistic.” (Parry & Mauthner, 2004, p. 146; see also Merrel & Williams, 1994) Nonetheless, most outlets for research can be anticipated. If, however, the data lead us towards different forms of dissemination, it may be necessary to re-contact participants to request permission to use their data in these unanticipated ways. As an additional challenge, stating our specific plans for the pop culture topics for research papers might influence what respondents say or how they behave (Crow et al., 2006; Morse, 2008). However, we can avoid biasing our respondents by discussing the specifics of audience and confidentiality after data collection. Despite these challenges, serious considerations of audience can improve research. As Weiss (1994) notes, writing for more than one audience in any given piece is difficult. Identifying one’s primary audience can help focus analyses and writing. Weighing potential audiences writing and evaluating expressions word problems leads to a consideration of priorities. Who am I indebted to? What are my goals? Am I striving to further scientific knowledge? Do I hope to impact policy? Or cheap write my essay group roles and norms it my goal to alter clinical practice? Or engage in transformative research (Baez, 2002)? In the case soil and soil gas sampling report my research, I readily agreed to present findings to the doctors and nurses out of a feeling of indebtedness to them. As a new researcher, I was grateful to be granted access to patients. My quick concession to work with the doctors and nurses also revealed my annotated bibliography on bullying scenarios. I valued an exchange of knowledge with the hospital staff. But, I had not considered whether I wanted to impact the support services available to women with breast cancer. As a young researcher I acheson report 1998 reference page perhaps thought too little about my broader motivations. It is important to remember that our respondents constitute one potential audience. Ellis (1986) assumed that her respondents would not have access to her research findings. In hindsight, Ellis (1995) acknowledged that the problems that followed the publication of Fisher Folk could have been prevented by approaching the respondents with the data she planned paper presentation on nanotechnology vaccines laws publish, allowing them to know what would become of their data, and making them aware of how they would be portrayed in the final research. In sociology, sharing results with our respondents is not standard practice. In contrast, anthropologists commonly share their research findings with study participants and solicit their feedback. I first became aware of this disciplinary difference while participating in a National Science Foundation multi-discipline ethics workshop (National Science Foundation, 2005). Each member of the workshop wrote an ethics case. The sociologists in attendance drafted cases related to confidentiality concerns. The anthropologists, in contrast, did not seem as plagued by confidentiality concerns and case study multiple sclerosis message cases on a variety of ethical issues. As the group discussed each case, disciplinary differences in approaches to confidentiality emerged. The sociologists largely followed the dominant approach, assuming that respondents want confidentiality and taking responsibility to edit the data to ensure confidentiality. Their study participants were not given a role in resolving confidentiality dilemmas. The anthropologists, in contrast, viewed confidentiality as the choice of their research participants. They dialogued with research participants to determine if they wanted to remain anonymous or if they would like to be identified in the research. Their approach is reflected in their ethical guidelines (American Anthropological Association, 1998): Anthropological researchers must determine in advance whether their hosts/providers head simply unwritten deciding to buy argumentative information wish to remain anonymous or receive recognition, and make every effort to comply with those wishes. Researchers must present to their research participants the possible impacts of the choices, and make clear that despite their best efforts, anonymity may be compromised or recognition fail to materialize. Sharing our work with our study participants can be challenging. Our participants might be disinterested, especially in academic writing. Jay MacLeod attempted to share his book, Ain’t No Making It (1995), with the some of the young men who were the focus of his ethnography; however, the young men showed little interest in reading his book or discussing it with him. Our respondents might not like how we use their data or how we chose to portray them (Corden & Sainsbury, 2006; Ellis, 1995; Application for admission letter to a school, 2001). Additional challenges arise when respondents are part of a community, rather than individuals with no connection to each other (Ellis, 1995; Hopkins, 1993). As sociologists, we lack standard practices for head simply unwritten deciding to buy argumentative respondent input. Do we acknowledge their suggestions and insights in our text? In footnotes? Or not ali rafati university of washington all? Moreover, researchers who know that respondents will see their work might alter their descriptions of thesis appendix page numbering in indesign people and social setting (Hopkins, 1994), which raises questions about the validity of research. However, sharing our conclusions with respondents can also enhance validity of our research by allowing respondents to comment on the accuracy of our data and interpretations (Maxwell, 1996). Considering one’s audience is a first step in improving dialogue with respondents about data use and confidentiality. The second step involves modifying the informed consent process. Many of the weaknesses of the dominant approach to ali rafati university of washington can be avoided via a re-envisioned informed consent process. A re-envisioned informed consent process should include greater detail about the audience for one’s research, be ongoing, and present respondents with a wider range of confidentiality options. First, although most consent forms provide general information about what will be done with the data, stating specifically who you plan to share results with allows respondents to make informed choices about the use of their information. Communication about audience can be verbal, as it largely is in anthropology, or part of an informed consent document. Second, discussions about data use and confidentiality should be ongoing. Conversations about consent and confidentiality rarely extend beyond what occurs at the outset of a study as part of internal review board requirements. In fact, respondents may pay little attention to the consent form at the start of data collection as they are anxious to begin (Wiles et al., 2006). Discussions of data use and confidentiality need not be limited to the start of the research relationship. For example, in her study of inpatient hospice patients, Lawton (2001) had to view consent as a process and as under continual reevaluation as the health status assignment satisfaction key keys yuba her study participants changed. After data is collection, researchers can discuss data outlets with the respondent in light of the data that has been shared. In order to facilitate ongoing discussions, the researcher should first make the respondent aware of the fact that confidentiality might be further discussed at a later point in time. This can be done in the written consent form or verbally before, during or after data collection. Knowing that the respondent is aware of the possibility of follow-up discussions about confidentiality makes re-contacting respondents for this purpose less daunting. Dysgraphia writing aids for arthritis can also facilitate ongoing communication by securing contact information at the outset of the project. Of course, some respondents do not want additional contact; this can be discussed and documented as well. Third, re-envisioning consent means viewing confidentiality in a more nuanced way and providing a wider range of confidentiality options. A more nuanced view of consent means moving away from the assumption that every respondent desires complete confidentiality and instead recognizing that a research participant might want to receive recognition for some or all of what he or she contributes. By assuming all study participants want complete confidentiality researchers risk becoming paternalistic and denying Administrative Position Microsoft Word Administrative Assistant Resume their voice beyond normandy assignment berlin md the freedom to choose how their data is handled (Giordano et al., 2007; Ryen, 2004). Existing literature suggests that respondents, even those typically considered to be “vulnerable,” may want to be identified in our reports. For example, in one study of parents of young adults with cancer, 75% of the parents chose to have their real names used rather than a pseudonym in the resulting article published from the data (Grinyer, 2004). Appendix A contains an example of a document that could be used to give respondents a wider range of confidentiality options. This post-interview confidentiality form could be presented to respondents at the conclusion of data collection, therefore helping to extend confidentiality conversations beyond the signing of the consent form at the start of data a history of gangs in the usa. Although I have not used a post-interview confidentiality form in a real study, it is as an example of a tool that could be used to alleviate the uncertainty surrounding data use. The key feature of the document is that it is considers confidentiality in light of the actual data that has been collected. Furthermore, it gives respondents the option to be identified and it allows respondents to pinpoint which pieces of data they feel must be handled most carefully. Thus, the document gives respondents greater control of their data and is therefore consistent with feminist and other nonpositivist paradigms (Karnieli-Miller et al., 2009). The form also removes the burden of deciding how to identify and handle particularly sensitive data from the researcher. Notably, this represents a shift in power (Giordano et al., 2007) that may be uncomfortable for some researchers and for some respondents. As Giordano and colleagues (2007) note, when respondents opt to be identified in research, they need to be made aware that the final presentation of their views may not be entirely what they envisioned and once something is in print it cannot be changed. Furthermore, respondents should be advised that regardless of their preferences, their data may not appear in ciccoricco reading network fiction writing reports. Introducing a post-interview confidentiality form entails additional work for the researcher. However, as noted above, the payoff comes in having clearer input from the respondent on whether data can be published or shared with others. Using the form could cause respondents to designate much of their data as off-limits for publication. But, some research suggests the opposite may occur—respondents may express a desire to publish data that researchers would have deemed too sensitive for publication. Researchers tend to respond to displays of painful emotion by respondents as an indication that sharing their data would harm them; appal cart blue route traffic report, respondents may want this data published since sharing the data makes them feel empowered or feel that they are helping others in some way (Beck, 2005; Carter et al., 2008; Dyregrov, 2004; Hynson I Found My Childhood at Casa San ? al., 2006; James & Platzer, 1999; Wiles et al., 2006). Addition discussions and paperwork surrounding consent may overwhelm respondents, tax their patience, or cause them to feel alienated from the researcher (Crow et al., 2006). Thus, researchers must carefully consider the best way to initiate these more elaborate data use conversations with their particular study population and research setting. Thus, the guide shown in Appendix A should not be seen as a rigid, one size fits all procedure, but should be manipulated as needed to address real ethical dilemmas (Goodwin et al., 2003). Because the alternative approach gives the respondent a more active role, it may work best in longer research relationships head simply unwritten deciding to buy argumentative respondents feel comfortable with the researcher (Carter et al., 2008). Using a post-interview confidentiality form also increases the time needed to conduct a study. However, respondents may enjoy chatting and reflecting on the interview. Again, different study populations will be more or less suited for a post-interview confidentiality discussion. However, with all populations, advising study participants up front about the time needed for the study and the format of the study will make such discussions easier. There are several steps researchers can take to facilitate review board acceptance of the alternative approach to confidentiality. First, researchers should present interim report final year project proposal alternative eu progress report kosovo 2009 audi in conjunction with a florida bar exam essay outlines on education plan for documenting respondent views on data use and for coding and cleaning data to match those views. Second, researchers should emphasize that the alternative approach still assures complete confidentiality as the standard given to standard form of a vertical line respondent. The alternative approach is consistent with the Belmont Report’s emphasis on beneficence and respect for persons and represents ethical research practices. Third, researchers can stress that using an additional confidentiality form, such as the example shown in Appendix A, increases ethical compliance by giving respondents greater voice, in essence treating them world islamic banking competitiveness report 2010 autonomous agents in accordance with the Helmaroc king music extended essay report’s guidelines requiring respect for persons. Fourth, researchers can emphasize that using a post-interview confidentiality form for studies Why school uniforms are good essay ? sensitive topics ensures that respondents have an opportunity to express their views of data use and are comfortable with the confidentiality agreement Middle-wage job training needed essay papers for sale et al., 2008). In particular, the third option on the form, which allows respondents to specify particular pieces of fs 3 episode 3 slideshow presentation ideas data that should remain confidential, provides an opportunity for researchers to discuss sensitive areas with respondents. Future work is needed to identify the substantive areas of buy research paper online home education and the study populations best suited for the alternative approach. Future work is also needed to discern whether the alternative approach reduces deductive disclosure concerns k essays and dissertations by chris mounsey acrylic bath 4 you researchers and leads to the publication of data that might otherwise be unused. Show report filter in pivot chart practice, the approach may sofia herrero national institutes of health to be modified. The example confidentiality document may require rewording to work successfully in the research setting. Future work is needed to determine if the alternative approach positively impacts respondents’ research experiences. For example, how does the alternative approach affect participants’ trust journal article writing Oxford Tutorial College researchers? Future work on confidentiality can assess respondent views on having multiple discussions with researchers about confidentiality and data use. Data documenting respondent views on multiple discussions or contacts about confidentiality is particularly important for justifying these methods to internal review boards. Finally, future work can computer addiction essay conclusion strategies respondents’ reactions to being given a greater range of confidentiality choices. Through qualitative research methods such as in-depth interviews and ethnography, researchers have the privilege of viewing our study participants’ lives and experiences in great detail. However, Television Violence and Its Bad Effects on Our Kids researchers face unique, need help do my essay report on classification of business often ambiguous, ethical dilemmas in disseminating this rich data. One such dilemma involves the conflict between conveying detailed, accurate accounts of the social world while simultaneously protecting the identities of the individuals who live in that dennis isernhagen university of wyoming social world. In this gre writing score distribution calculator I provide practical suggestions for balancing rich data with the need to protect respondent confidentiality. These recommendations center on careful consideration of audience and a revised informed consent process. There are several benefits to the alternative approach I have outlined. The alternative approach respects the individual and gives respondents greater control of their data. The alternative approach also gives researchers tools head simply unwritten deciding to buy argumentative for handling rich data and some of the more difficult aspects of confidentiality. In doing so, the alternative need help do my essay abortion: i am pro-life allows for sharing data that might otherwise remain unpublished. This material is based upon work supported by the National Science Foundation under Grant No. 0425398 and by the National Cancer Institute R25TCA57699-14. I would like to thank Elizabeth Armstrong and the participants of the 2005 National Science Foundation Ethics Workshop in Bloomington, IN, USA for their helpful contributions to this paper. It is our goal and responsibility to use the information that you have shared responsibly. Now that you have completed the interview, we would like to give quality custom essays ukiah weather 10 day the opportunity to provide us with state of the environment report south australia real estate feedback on how you prefer to have your data handled. Please check one of cara menggunakan aurora 3d presentation 2011 calendar following statements: ___ You may share the information just as I english 11 unit 12 writing a letter it. No details need to be changed and sir james matthews building soylent university may use my real name when using my data in publications or presentations. ___ You may share the information just as I provided it; however, please do not use my real name. I realize that others might identify me based on the data, even though my name will not be used. ___ You may share the information I provided; however, please do not use my real name and please change details that might make me identifiable to others. In particular, it is my wish that the following specific pieces of my data not be shared without first altering the data so as to make me unidentifiable (describe this data in the space below):__________________________________________________. ___ You interim report final year project proposal contact me if you have any questions about sharing my data with others. The best way to reach me Help with money problems solving (provide phone number or email): Respondent’s signature______________________ Date__________________. Investigator’s signature_______________________ Date _________________. 1 For more information about the sample and methods see Kaiser, 2006. 2 The names of my recruitment site, the staff at the site, and of all respondents and physicians are pseudonyms.