1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leokris [45]
3 years ago
6

Which of the following methods could be considered a "best practice" in terms of informing respondents how their answers to an o

n-line survey about personal information will be protected?
A. Respondents are informed that investigators will try to keep their participation confidential; however, confidentiality cannot be assured.
B. Respondents are informed that a research assistant will transfer all the research data to a password-protected computer that is not connected to the internet, via a USB flashdrive. The computer is located in a research team member's office.
C. The investigator uses the informed consent process to explain her institution's method for guaranteeing absolute confidentiality of research data.
D. The investigator uses the informed consent process to explain how respondent data will be transmitted from the website to his encrypted database without ever recording respondents' IP addresses, but explains that on the internet confidentiality cannot be absolutely guaranteed.
Social Studies
2 answers:
Anton [14]3 years ago
7 0

The “best practice” for this case is that the investigator uses the informed consent process to explain how respondent data will be transmitted from the website to his encrypted database without ever recording respondents' IP addresses, but explains that on the Internet confidentiality cannot be absolutely guaranteed. This is one of the essential ethics for conducting internet-based research.

 

EXPLANATION:

Five online research methods are widely used by scholars because of the precise nature of the offered results:

1. Online focus group

Online focus group is a subgroup of online research techniques. Online focus groups is the method that is typically used for consumer research, a B2B research, and political research. A moderator is appointed to do and oversee a focus group that invites pre-selected participants and meets the requirements representing certain areas of interest to be part of this focus group at a certain time. Respondents are usually given an incentive to be a part of the discussion which is usually one hour and 90 minutes.

2. Online interview

This method is very similar to a face-to-face interview. However, it differs in terms of the needed standard practices, comprehending with sampling and respondents. Online interviews are arranged using a variety of computer-mediated communications (CMC), basically, SMS or Email.  

On the foundation of response time for this interview, they are categorized into asynchronous and synchronous methods. Synchronous online interviews are taken through media such as online chat, where the responses are received in real-time whereas asynchronous online interviews are those that occur via Email where responses are usually not in real-time.  

Similar to that of face-to-face interviews, online interviews investigate respondents' thoughts and feedback on a certain topic to gain insight into their experiences, attitudes, or ideas.

3. Online qualitative research

In addition to online focus groups online and online interviews, there are a variety of aspects of online qualitative research. These aspects comprise mobile diaries, blogs, and communities. These methods support cost and time savings and are very convenient for scholars to collect information for their research topics.  

The sophistication level brought by online qualitative research methods is better than other traditional forms because respondents can be recruited from panels, existing databases, or can be added by doing surveys.

4. Online text analysis

This technique of analysis is an augmentation of existing text analysis since the 17th century which is a group of various online research examples that are used to gain insights from content which is available online. By utilizing this online research technique, scholars can explain the format of written, verbal or graphic communication.  

Categories such as paragraphs, web pages, sentences, pseudo sentences, documents, etc. It is usually used for quantitative research but for better text interpretation, scholars also use qualitative techniques.

5. Social network Analysis

Social network analysis is an emergent online research technique that is obtaining acceptance because of the increasing adoption of social networking devices. By doing social networks analysis, a scholar can map and measure relationships and flows between people, URLs, organizations, computers or groups using graph theory.  

For example, the newest meme culture has advanced a new social structure where related people are referred to as “memes” and "nodes" are "connection" between these nodes.

LEARN MORE

If you’re interested in learning more about this topic, we recommend you to also take a look at the following questions:

• Which is an online research source that not considered reliable? brainly.com/question/11333105

• When conducting research online for an easy which tip should the researcher follow? brainly.com/question/12314449

KEYWORDS : Online Research Methods, Personal Information on Online Research

Subject  : Social Studies

Class  : 10-12

Sub-Chapter : Research Ethics

Andre45 [30]3 years ago
6 0

Answer:

D. The investigator uses the informed consent process to explain how respondent data will be transmitted from the website to his encrypted database without ever recording respondents' IP addresses, but explains that on the internet confidentiality cannot be absolutely guaranteed.

Explanation:

Keep in mind that breach of information during on-line survey could be the researcher's fault or subject's fault, depending on how they secure their internet connection.

- Method A is not suitable because of this phrase:   'confidentiality cannot be assured' .  This will make the subject thinks that the researchers are not taking responsibilities in protecting the information.

-Method B is not suitable because it create a physical location where people could come in and directly steal the data of all the subjects,

- Method C is not suitable because it does not educate the subjects with the possibilities that they can personally made the mistake that can cause the breach of information.

- Method D is the most suitable because it conveys that the research team is making their full efforts to ensure the anonymity of the subjects and also educate them regarding the possibilities of breach information from the subject's mistake. (it would be even better if the investigator advised the subjects to use trusted VPN services.)

You might be interested in
What impact do you want to make in the world? select a problem or social issue and explain why it is important to you. what do y
maksim [4K]
This sounds like a test essay prompt! What are you hoping to achieve by presenting this essay to Brainly? What social issues are you presented that impact you? -Minority issues such as social safety and finance -Economic changes such as jobs and education -Political changes such as social status and human rights -Social issues such as family struggles
3 0
3 years ago
According to the Anti-Federalist Papers, are the Bill of Rights necessary? Why or why not? Cite evidence from at least one of th
Pani-rosa [81]

Answer:

They believe that the Bill of Rights are not necessary because the government should have control over these decisions.

The Federalists wanted a strong government and strong executive branch, while the anti-Federalists wanted a weaker central government. The Federalists did not want a bill of rights —they thought the new constitution was sufficient. The anti-federalists demanded a bill of rights.

Explanation:

4 0
3 years ago
Read 2 more answers
Barry has been diagnosed with schizophrenia. His demeanor is unusual compared to most people because he does not show emotional
Drupady [299]

The correct answer would be option A, the negative symptoms of schizophrenia

His demeanor is unusual compared to most people because he does not show emotional expression when he speaks, and does not appear to have the ability to read other's emotional expressions. These symptoms are also known as the the negative symptoms of schizophrenia.

Explanation:

Schizophrenia is a mental disorder in which people cannot interpret the reality normally. Their thoughts, feelings, perceptions, behaviors and emotions are all faulty and abnormal. Schizophrenia can cause delusions, hallucinations and extremely disordered thinking.

There are two types of symptoms of schizophrenia. One is Negative and the other is positive. Positive symptoms may include hallucinations, delusions, and racing thoughts, whereas negative symptoms may include apathy, lack of emotion, poor or nonexistent social functioning, etc.

So when Barry does not show his emotional expressions when he speaks, it means he has negative symptoms of Schizophrenia.

Learn more about Schizophrenia at:

brainly.com/question/6868018

#LearnWithBrainly

7 0
3 years ago
which term is used to identify u.s. citizens' guaranteed freedoms that come in the form of restrictions on the government?
professor190 [17]

Civil liberties are constitutionally guaranteed guarantees and liberties that protect citizens, their opinions, and their property from arbitrary government interference.

The freedoms guaranteed by the United States Constitution are known as civil liberties (primarily from the First Amendment). They are inalienable laws that each person possesses. Civil liberties, while commonly referred to as "rights," actually serve as constraints on how the govt can treat its citizens.

Learn more on civil liberties -

brainly.com/question/28452894

#SPJ4

3 0
1 year ago
Which practice is an example of Theory X management?
Sveta_85 [38]

Answer:

keystroke monitoring

Explanation:

keystroke monitoring is a device that runs on a particular computer to monitor all keypad inputs. Thus, the one who left the program running can, at another time, check everything that was typed during a certain period.

This type of device is an example of Theory X management and is designed for perfectly legal actions, such as monitoring the activity of employees at a company or even for parents to check what content their children have accessed on the Internet.

3 0
3 years ago
Other questions:
  • Critical sociology can best be described as a(n) ________ approach.
    5·1 answer
  • The House Un-American Activities Committee (HUAC) was run by
    11·2 answers
  • It is ok if your goal is not clear because you will be able to define it along the way
    5·2 answers
  • Which of the following is a true statement?​ A. ​Symbols are found only in religious and social areas of cultural life. ​ B. Sym
    7·1 answer
  • What were some of the lasting effects of the 200 years of the Crusades?
    6·1 answer
  • English ships that landed at Jamestown in 1607: susan constant , discovery
    7·1 answer
  • The difficulty with the proposed high-speed train line is that a used plane can be bought for one-third the price of the train l
    8·1 answer
  • __________ is/are the process(es) by which people act toward or respond to other people, and also is/are the foundation(s) for a
    9·1 answer
  • Why do Canadians typically know more about U.S. culture than Americans know about Canadian culture? A. most Canadians are former
    12·2 answers
  • It is possible to exist inherently ambiguous languages generated by unambiguous grammars; however, it is not possible to have an
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!